Information
This policy setting suppresses file download prompts that are not user-initiated. In certain circumstances, websites can initiate file download prompts without interaction from users. This technique can allow websites to put unauthorized files on users' hard drives if they click the wrong button and accept the download.
The recommended state for this setting is: Enabled: groove.exe, excel.exe, mspub.exe, powerpnt.exe, pptview.exe, visio.exe, winproj.exe, winword.exe, outlook.exe, spDesign.exe, exprwd.exe, msaccess.exe, onent.exe, mse7.exe.
Rationale:
Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferences may also allow the download to occur without prompting or interacting with the user. Even if Internet Explorer prompts the user to accept the download, some websites abuse this functionality. Malicious websites may continually prompt users to download a file or present confusing dialog boxes to trick users into downloading or running a file.
If the download occurs and it contains malicious code, the code could become active on user computers or the network.
Impact:
User-initiated downloads can still occur, so the majority of legitimate user download interactions remain unaffected.
It is possible that some advanced users may expect their user preferences to control this behavior, and for this reason they may be confused when this preference is overridden by this setting.
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled: Check all applications:
Computer Configuration\Administrative Templates\Microsoft Office 2016 (Machine)\Security Settings\IE Security\Restrict File Download
Default Value:
Not Configured