![onenote add ins for outlook onenote add ins for outlook](https://www.onenotegem.com/uploads/allimg/191124/1004321c5-1.gif)
You can avoid the display of security warnings by deriving all objects, properties, and methods from the Application object passed in the OnConnection procedure of the add-in.
#ONENOTE ADD INS FOR OUTLOOK CODE#
Even though this displays security warnings in the existing COM add-ins that access the Body or HTMLBody properties of items, this will help prevent malicious code from running without the user being aware of it. This allows users to verify that the program or add-in accessing the Body and HTMLBody properties of items is trustworthy, before they allow access to the contents of the items. Outlook 2003 inherits the Outlook 2002 object model guard behavior, and in addition, blocks code that attempts to access the Body and HTMLBody properties of various Outlook items. Outlook Object Model Guard Improvements and its Impact on COM Add-ins Again, as in Outlook 2002, Outlook 2003 trusts only the main Application object that is passed to the OnConnection event of the add-in. An add-in will be considered trusted only if it's registered in the Security Settings folder. There has been no change in the way Outlook trusts COM add-ins in an Exchange environment when the security settings are obtained from the Exchange server.
![onenote add ins for outlook onenote add ins for outlook](https://www.onenotegem.com/uploads/allimg/191125/1Z3205530-3.gif)
Read below for more information.ĬOM Add-ins Using Security Settings from an Exchange Server The main Application object that is passed to the OnConnection event of the add-in. This implies that the add-ins that run on clients that are not Exchange clients and the add-ins that use default security in Exchange environments are trusted automatically. In Microsoft all COM add-ins that run on a computer, not configured to obtain security settings from a Microsoft Exchange Server, are considered trusted by default.