@echo off
:checkOS
if exist "%PROGRAMFILES(X86)%" (goto 64bit) else (goto 32bit)
:64bit
cd "C:\Program Files (x86)\Microsoft Office\Office14"
cscript ospp.vbs /sethst:vs12app01
cscript ospp.vbs /inpkey:<25 Char Key>
cscript ospp.vbs /act
goto end
:32bit
cd "C:\Program Files\Microsoft Office\Office14"
cscript ospp.vbs /sethst:vs12app01
cscript ospp.vbs /inpkey:<25 Char Key>
cscript ospp.vbs /act
goto end
:end
To enable standard user activation on a KMS client, add a new DWORD registry value named UserOperations and set its value to 1. Create this value in the
HKEY_LOCAL_MACHINE
\SOFTWARE
\Microsoft
\Windows NT
\CurrentVersion
\SoftwareProtectionPlatform
UserOperations (DWORD) = 1
Source: https://technet.microsoft.com/en-us/library/ff793402.aspx
Within a domain, an administrator can deploy the Programmatic Access Security settings via Group Policies to prevent the security prompts from ever showing up.
For this, the following options should then be set:
This results in the following Registry keys being set:
HKEY_CURRENT_USER
\Microsoft
\Software
\Policies
\Office
\<version>
\Outlook
\Security
AdminSecurityMode (REG_DWORD) = 3
HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\<version>\Outlook\Security
PromptOOMSend
PromptOOMAddressBookAccess
PromptOOMAddressInformationAccess
PromptOOMMeetingTaskRequestResponse
PromptOOMSaveAs
PromptOOMFormulaAccess
PromptSimpleMAPISend
PromptSimpleMAPINameResolve
PromptSimpleMAPIOpenMessage
REG_DWORD
Value:2
You’ll find Registry files to disable all the Programmatic Security prompts for Outlook 2007, Outlook 2010 and Outlook 2013 in the download below for use in non-domain environments.
https://www.msoutlook.info/files/disableprogrammaticsecurity.zip
https://www.msoutlook.info/question/883