Blocking legacy protocols with new Trust Center settings in Microsoft 365 Apps for Windows

Microsoft has introduced new Trust Center controls in Microsoft 365 Apps for Windows to reduce exposure to legacy protocols.
Starting with version 2508:

  • File opens using FrontPage Remote Procedure Call (FPRPC) are blocked by default, with a more secure fallback protocol used when available.
  • New Trust Center settings allow users to disable FTP and HTTP file opens. By default, these protocols remain allowed unless changed by an admin.

Timeline

The new Trust Center controls are available in Microsoft 365 Apps for Windows starting with version 2508.
This update does not affect Microsoft 365 apps on macOS, Microsoft Teams, the web, or mobile.

How does this affect your users?

Legacy protocols such as FrontPage Remote Procedure Call (FPRPC) are now blocked by default, though admins can change this behavior using Group Policy or Cloud Policy service. Other legacy protocols, including FTP and HTTP in apps, remain allowed by default, but users and admins can modify these settings.

New protocol settings in Microsoft 365 Apps starting with version 2508
New protocol settings in Microsoft 365 Apps starting with version 2508
Admin controls and configuration

Admins can configure these new protocol settings through either Group Policy or the Cloud Policy service.

If you’re using the Group Policy Management tool, all these policy settings are located under User Configuration\Policies\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center.

The following policies are available in the Cloud Policy service:

Restrict Apps from FPRPC Fallback
This policy setting allows you to control the fallback behavior of Microsoft 365 apps when using FrontPage Server Extensions Remote Procedure Call Protocol (FPRPC).

  • If you enable this policy setting, Microsoft 365 apps will not use FPRPC.
  • If you disable this policy setting, Microsoft 365 apps will continue to use FPRPC.
  • If you don’t configure this policy setting, Microsoft 365 apps will continue to use FPRPC.

Block Insecure Protocols
This policy setting allows you to control which protocols can be used when opening documents in Microsoft 365 apps.

  • If you enable this policy setting, non-HTTPS links will be blocked when opening documents in Microsoft 365 apps.
  • If you disable this policy setting, all protocols and links will be allowed when opening documents in Microsoft 365 apps.
  • If you don’t configure this policy setting, all protocols and links will be allowed when opening documents in Microsoft 365 apps.

Share
Avatar photo

Tobias Asböck

Tobias is a Senior System Engineer with around ten years of professional experience with Microsoft 365 products such as SharePoint Online, SharePoint Premium, OneDrive for Business, Teams Collaboration, Entra ID, Information Protection, Universal Print, and Microsoft 365 Licensing. He also has 15+ years of experience planning, administering, and operating SharePoint Server environments. Tobias is a PowerShell Scripter with certifications for Microsoft 365 products. In his spare time, Tobias is busy with updates in the Microsoft 365 world or on the road with his road bike and other sports activities. If you have additional questions, please contact me via LinkedIn or [email protected].

Leave a Reply

Your email address will not be published. Required fields are marked *