Trusted Locations is a feature of Office where files contained in these folders are assumed safe, such as files you create yourself or saved from a trustworthy source. These files bypass threat protection services, bypass file block settings, and all active content is enabled. This means files saved in Trusted Locations aren't opened in Protected View or Application Guard.
Active content can include unsigned add-ins, VBA macros, connections to external data and more. Ensure you trust the original source of the file before saving it to a Trusted Location. It's important as all active content is enabled, and users don't receive notifications about potential security risks. The following diagram shows the trust workflow for opening Office files.
As shown in Step 2, files in Trusted Locations bypass all other security and policy checks. Therefore, Trusted Locations should be used rarely, for unique situations and only for select users. In the security baseline for Microsoft 365 Apps for enterprise, the guidance is to disable network-based Trusted Locations. Then, if needed, control Trusted Locations centrally through policy and don't allow users to set Trusted Locations themselves.
Planning steps for Trusted Locations
Trusted Locations enable all content within a file, including add-ins, ActiveX controls, hyperlinks, links to data sources and media, and VBA macros. Files that are opened from Trusted Locations skip file validation checks, File Block checks, and don't open in Protected View or Application Guard. There are different levels of trust you can allow in your organization for Trusted Locations:
Allow end users to create Trusted Locations on their device or network themselves
Use policy to prevent users from creating Trusted Locations
Use policy to centrally manage Trusted Locations
Disable Trusted Locations
It’s important to choose the scenarios that are best for your organization and its security risk tolerance.
To implement Trusted Locations, you must determine:
The Office apps for which you want to configure Trusted Locations.
The folders that you want to designate as Trusted Locations.
The folder sharing and folder security settings that you want to apply to your Trusted Locations.
The restrictions that you want to apply to Trusted Locations.
Determine the Office apps for which you want to configure Trusted Locations
You can view the list of Trusted Locations by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations in the following Office apps:
Policies are also available for Project, but Project doesn't have Trusted Locations settings in the Trust Center.
Determine the folders to designate as Trusted Locations
Here are some considerations to keep in mind when determining which folders to use as Trusted Locations:
Unless blocked by policy, users can create and modify Trusted Locations in the Trust Center for their Office app. For more information, see Add, remove, or change a trusted location.
By default, only Trusted Locations local to the user's device are allowed. Network locations can also be set as a Trusted Location, but not recommended.
We don't recommend that users specify root folders as Trusted Locations. For example, the C: drive or the My Documents folder. Instead, create a subfolder within those folders and specify only that folder as a Trusted Location.
One or more applications can use the same Trusted Location.
You can use the Trusted Location #1 policy to designate Trusted Locations for your users.
Determine folder sharing and folder security settings for Trusted Location folders
All folders that you specify as Trusted Locations must be secured to prevent malicious users from adding or modifying files in a Trusted Location.
If a folder is shared, configure sharing permissions so that only authorized users have access to the shared folder.
Be sure to use the principle of least privilege and grant permissions that are appropriate to a user. Grant Read permission to users who don't need to modify files in Trusted Locations. Give Full Control permission to users who must edit files.
Use policy to manage Trusted Locations
There are several policies that you can use to manage Trusted Locations in your organization.
You can use Cloud Policy, the Microsoft Intune admin center, or the Group Policy Management Console to configure and deploy policy settings to users in your organization. For more information, see Tools available to manage policies.
There are separate policies for Trusted Locations for each Office application. The following table shows where each policy can be found in the Group Policy Management Console under User Configuration\Policies\Administrative Templates.
Application
Policy location
Access
Microsoft Access 2016\Application Settings\Security\Trust Center\Trusted Locations
Excel
Microsoft Excel 2016\Excel Options\Security\Trust Center\Trusted Locations
PowerPoint
Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center\Trusted Locations
Project
Microsoft Project 2016\Project Options\Security\Trust Center
Visio
Microsoft Visio 2016\Visio Options\Security\Trust Center
Word
Microsoft Word 2016\Word Options\Security\Trust Center\Trusted Locations
You can use this policy to specify the path for a Trusted Location for users in your organization. There are 20 instances of this policy. For example, Trusted Location #1, Trusted Location #2, Trusted Location #3, etc.
By default, these policies are blank. To add a Trusted Location, enable the policy and specify the path to the Trusted Location. Make sure that the location that you specify is secured, by setting permissions so that only the appropriate users can add Office files to that location.
Trusted Locations that you specify with this policy appear under the Policy Locations section under File > Options > Trust Center > Trust Center Settings... > Trusted Locations.
Note
You can use environment variables when specifying a Trusted Location.
These 20 policies are also available under User Configuration\Policies\Administrative Templates\Microsoft Office 2016\Security Settings\Trust Center. If you use this version of the policy, the policy applies to all the apps that support Trusted Locations.
"Allow Trusted Locations on the network" policy
This policy controls whether Trusted Locations on the network can be used.
By default, Trusted Locations on network locations are disabled. But users can change this setting by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations and selecting the Allow Trusted Locations on my network (not recommended) checkbox.
Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.
Icon
Protection level
Policy state
Description
Protected [recommended]
Disabled
Blocks Trusted Locations on network locations, including any configured by the admin (for example, by using the "Trusted Location #1" policy).
Ignores any network locations set by users as Trusted Locations in the Trust Center, and prevents users from adding more.
Not protected
Enabled
Allows network locations as Trusted Locations to be set both by users and by policy.
Partially protected
Not Configured
By default, users are blocked from adding network locations as Trusted Locations, but could enable this setting by selecting the Allow Trusted Locations on my network (not recommended) checkbox in the Trust Center
We recommend setting this policy to Disabled as part of the security baseline for Microsoft 365 Apps for enterprise. You should disable this policy for most users and only make exceptions for certain users as needed.
You can specify web folders as Trusted Locations. But only those web folders that support Web Distributed Authoring and Versioning (WebDAV) or FrontPage Server Extensions Remote Procedure Call (FPRPC) protocols are recognized as Trusted Locations.
"Disable all trusted locations" policy
This policy can be used to disable all Trusted Locations.
By default, Trusted Locations are available, and users can designate any location as a Trusted Location and a device can have any combination of user-created and admin-configured Trusted Locations.
Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.
Icon
Protection level
Policy state
Description
Protected
Enabled
All Trusted Locations are blocked.
Not protected
Disabled
A user or device can have a combination of Trusted Locations created by the user or configured by the admin (for example, by policy).
Not protected
Not Configured
This setting is the Office default. Provides the same behavior as Disabled.
Organizations that have a highly restrictive security environment typically set this policy to Enabled.
"Allow mix of policy and user locations" policy
This policy controls whether Trusted Locations can be defined by users and by admins (for example, by policy), or if Trusted Locations can only be defined by policy.
This policy can be found under User Configuration\Policies\Administrative Templates\Microsoft Office 2016\Security Settings\Trust Center in the Group Policy Management Console.
Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.
Icon
Protection level
Policy state
Description
Protected [recommended]
Disabled
Only Trusted Locations defined by policy are allowed.
Not protected
Enabled
A user or device can have a combination of Trusted Locations created by the user or configured by the admin (for example, by policy).
Not protected
Not Configured
This setting is the Office default. Provides the same behavior as Enabled.
We recommend setting this policy to Disabled as part of the security baseline for Microsoft 365 Apps for enterprise. You should disable this policy for most users and only make exceptions for certain users as needed.
Default Trusted Locations for Office apps
Several folders are designated as default Trusted Locations in an installation of Office. The default Trusted Locations are listed in tables for the following applications.
Describes an issue that macros in embedded workbook are blocked from running when the Block macros from running in Office files from the Internet policy is enabled.