Gain insight into your system's behavior today.
LTTng is an open source tracing framework for Linux.
We often talk about macros, add-ins, and ActiveX controls when discussing Office security. But lurking just a few clicks away in the Trust Center is a feature that is simultaneously one of the most protective and one of the most frustrating in the Microsoft 365 ecosystem: File Block Settings .
If you have ever tried to open an old .xls file from 1998, received a corrupted .pptx , or watched a user panic because an email attachment opened as a wall of garbled text, you have witnessed File Block Settings in action. file block settings in the trust center
They allow you to say: "I will never touch a Word 6.0 document again. Please treat it as a potential bomb." We often talk about macros, add-ins, and ActiveX
Set File Block Settings to "Open selected file types in Protected View" . Users can still view and copy-paste data, but they cannot edit or save. This forces them to consciously choose "Enable Editing" and then "Save As" a modern format. They allow you to say: "I will never touch a Word 6
For legacy formats you must support (e.g., .xls files from a legacy ERP system), set the behavior to Protected View , not Hard Block . For truly dangerous formats ( .xla macro sheets, .wbk Word backup files), set the behavior to Hard Block . The "Save" Block: A Compliance Nightmare Most admins focus on "Open" blocks. The real policy drama comes from "Save" blocks.
Use PowerShell to scan network shares for .doc , .xls , and .ppt files. Identify who owns them and when they were last modified.
The easiest way to try LTTng is to
follow the quickstart guide: