Why should I not "Allow Trusted Locations on my network"?

Posted on 2010-09-14
Medium Priority
Last Modified: 2012-05-10
I am trying to understand more about the Trust Center in Office 2007. I discovered early on that the Trust Center can only point to the hard drive.

Somehow I overlooked the check box for "Allow Trusted Locations on my network (not recommended)". From what I gather on the Microsoft site, this is primarily because there is no accountability with most network drives, unlike the hard drive, which is controlled by individual users.  Are there other compelling reasons to not include network drives in the Trusted Locations?
Question by:jkunrein
LVL 120

Assisted Solution

by:Rey Obrero (Capricorn1)
Rey Obrero (Capricorn1) earned 600 total points
ID: 33672481
i believe that is the only reason as what was stated in the Microsoft site. Anybody who has permission to the network shared folders can place anything in the folder including files with malicious  codes.
LVL 28

Accepted Solution

omgang earned 700 total points
ID: 33672588
I'm curious to see what other have to say but here's my take on it.  I have specified my personal network directory (on our corporate network) as a Trusted location.  For apps I deploy to some of our users I also set their personal network directory as a Trusted location for them so that they do not receive the security prompt when using my apps.

Assume a user set an entire, public (everyone in the company), share as a Trusted location.  While browsing around they see an Access db and wonder "hey, I wonder what that's for?" so they open it.  If it contained harmful code it could be bad.

But, what if the user simply copied the Access db and dropped it into a Trusted location on their local hard drive?  What if the user received an Access db from someone outside the company and saved it to a Trusted location on their hard drive?  What if they downloaded an Access db from the web and....?

Ultimately, the user can still activate code by clicking Allow at the security prompt and/or by creating placing the db file into a Trusted Location.  The secuirty prompt is a notification to the user that the file contains executable code and they need to consider that before activating/enabling it.

OM Gang
LVL 74

Assisted Solution

by:Jeffrey Coachman
Jeffrey Coachman earned 700 total points
ID: 33673949
Just another theory here...

In today's  "Connected" world, the term "Drive" can mean almost any storage location.

So theoretically you could access a "Network" drive over the web.
This just opens up all types of security considerations.

So simply stating "Not recommend" is a good upfront warning.

Remember, from a casual user's stand point they will simply be tempted to make "Everything" trusted.
As far as they are concerned, this will get rid of that "annoying" message for every location, forever.

So this at least the let's then know that it is "not recommended", so at at the very least they will (Hopefully) ask someone before proceeding...


I too am interested in other Expert comments on this subject.


Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This is an article on how to answer questions, earn points and become an expert.
As a person who answers a lot of questions, I often see code that could be simplified, made easier to read, and perhaps most importantly made easier to maintain if the code was modified to use the Select Case statement. This article explains how to…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other. As you build tables in Microsoft Ac…

587 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question