Information
This setting controls whether Internet Explorer opens URLs containing user information that are passed to it by an Office application.
The recommended state for this setting is: Enabled: groove.exe, excel.exe, mspub.exe, powerpnt.exe, pptview.exe, visio.exe, winproj.exe, winword.exe, outlook.exe, spDesign.exe, exprwd.exe, msaccess.exe, onent.exe, mse7.exe
The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form
http://username:[email protected]
. A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate Web site but actually opens a deceptive (spoofed) Web site. For example, the URL
http://[email protected]
appears to open
http://www.microsoft.com
but actually opens
http://example.com
. To protect users from such attacks, Internet Explorer usually blocks any URLs using this syntax.
This functionality can be controlled separately for instances of Internet Explorer spawned by Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If user names and passwords in URLs are allowed, users could be diverted to dangerous Web pages, which could pose a security risk.
Solution
To establish the recommended state via configuration profiles, set the following Settings Catalog path to Enabled: check all applications :
Microsoft Office 2016 (Machine)\Security Settings\IE Security\Disable User Name and Password
Impact:
Enabling this setting can cause some disruptions for users who open URLs containing user authentication information from Office applications. Because such URLs are blocked by default when Internet Explorer opens Web pages through conventional means, however, most users should not experience significant usability issues.