By Richard Rost 2 years ago
Set Up a Trusted Location (Folder) in Access
In this video, I will show you how to set up a Trusted Location (Folder) on your PC so that you can avoid seeing Microsoft's security warnings and have your VBA or macros disabled every time you open the database.
I will show you how to do this in Access itself for users who have the full version of Office installed. I will also show advanced users how to do this by editing the Windows Registry which will even work if you are running just the Access Runtime edition.
Gavin from Detroit, Michigan (a Gold Member) asks: I routinely get database file updates from my home office. Whenever I download a new file, I get yellow bar across the top of the screen that gives me a security warning and nothing in the database works. I can click to enable the content, but that's annoying to have to do it every time. Is there a way to disable that?
Connor from Galway, Ireland (a Platinum Member) asks: I've built my database following your videos, and everything works great. I've set up a bunch of users on my network with a split database using the Runtime edition of Access. They are getting the Microsoft Access Security Notice every time they open the database. How can I get rid of that on their PCs since they don't have the full version of Office?
Members will learn how to use VBA to edit the Registry and write those keys for your users automatically without having to open the Registry Editor.
Silver Members and up get access to view Extended Cut videos, when available. Gold Members can download the database template from class plus get access to the Code Vault. If you signed up on YouTube you have to register on my YouTube Find User page so I can set up your account here on my web site. If you're not a member, Join Today!
microsoft access, ms access, ms access tutorial, #msaccess, #microsoftaccess, #help, #howto, #tutorial, #learn, #lesson, #training, #database, trusted location, trusted folder, security warning, enable content, trust center, split database, encrypt, back-end, front-end, runtime, registry keys
Subscribe to Trusted Location
Get notifications when this page is updated