Bobcares

For every $500 you spend, we will provide you with a $500 credit on your account*

BLACK FRIDAY SPECIAL

*The maximum is $4000 in credits, Offer valid till November 30th, 2024, New Customers Only, Credit will be applied after purchase and expires after six (6) months

For every $500 you spend, we will provide you with a $500 credit on your account*

BLACK FRIDAY SPECIAL

*The maximum is $4000 in credits, Offer valid till November 30th, 2024, New Customers Only, Credit will be applied after purchase and expires after six (6) months

A program is trying to send an email message on your behalf – How to fix

by | Nov 25, 2020

Outlook gives the warning, ‘A program is trying to send an email message on your behalf’ when an application sends an email or access Outlook data in an insecure manner.

As part of our Server Management Services, we assist our customers to fix similar errors.

Today, let’s take a look at the details of this warning and its fix.

 

‘A program is trying to send an email message on your behalf’

In Microsoft Outlook 2019, Outlook for Office 365, Outlook 2016, and Outlook 2013, when we send an email message from another program such as Microsoft Excel, we receive:

A program is trying to send an email message on your behalf

Similarly, two other variants which we may encounter are:

A program is trying to access e-mail address information stored in Outlook. If this is unexpected, click Deny and verify your antivirus software is up-to-date.

and

A program is trying to perform an action that may result in an e-mail message being sent on your behalf. If this is unexpected, click Deny and verify your antivirus software is up-to-date.

 

Causes for ‘A program is trying to send an email message on your behalf’

When a program tries to access Outlook client to send an email message, it often leads to this warning. This happens if the antivirus software is inactive or out-of-date.

Generally, these security warnings appear when a program:

  • attempts to access our contact information in the Outlook Address Book, or
  • attempts to send email on our behalf

By default, only COM add-ins are trusted programs. However, we can allow specific add-ins by adding them to a “Trusted add-ins” list.

 

Solutions for ‘A program is trying to send an email message on your behalf’

Our Support Engineers employ a variety of methods to resolve this error. Let’s have a detail look into it.

  • Enable or update the antivirus application

To learn how Outlook detects our antivirus status, we follow these steps:

  1. In Outlook, select File, then Options
  2. Select Trust Center, and then Trust Center Settings.
  3. Select Programmatic Access.
  4. View the Antivirus status that is listed in this window.
  5. If the status is anything other than Valid, follow the appropriate steps to enable the antivirus program, or update the antivirus program.
  • Change the Programmatic Access Security setting in Outlook

  1. In Outlook, select File, and then select Options.
  2. Select Trust Center, and then select Trust Center Settings.
  3. Select Programmatic Access.
  4. If we want to stop these warning permanently, select the Never warn me about suspicious activity (not recommended) option.
    If these options are not available, exit Outlook, and then start Outlook again in elevated mode.
    To do this, type Outlook on the Start Search box, right-click the Microsoft Outlook search result -> Properties -> Compatibility tab -> Run this program as an administrator.
  5. Select OK two times.

Furthermore, in Outlook 2007: Tools -> Trust Center… -> Programmatic Access

Outlook 2010 and Outlook 2013: File -> Options -> Trust Center -> Trust Center Settings… -> Programmatic Access

The registry data that is associated with the Programmatic Access Security options is as follows.

Office Click-to-Run Installations:

Same Bitness (32-bit Office running on 32-bit Windows or 64-bit Office running on 64-bit Windows):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Microsoft\Office\<x.0>\Outlook\Security

Different Bitness (32-bit Office running on 64-bit Windows):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Office\<x.0>\Outlook\Security

Office MSI-Based installations:

Different Bitness (32-bit Office running on 64-bit Windows):

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\<x.0>\Outlook\Security

Same bitness (32-bit Office running on 32-bit Windows or 64-bit Office running on 64-bit Windows):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\<x.0>\Outlook\Security

Note: The <x.0> placeholder represents the version of Office (16.0 = Office 2016, Office 2019, or Outlook for Office 365, 15.0 = Office 2013)

DWORD: ObjectModelGuard

Values:
0 = Warn me about suspicious activity when my antivirus software is inactive or out-of-date (recommended)
1 = Always warn me about suspicious activity
2 = Never warn me about suspicious activity (not recommended)

To determine whether the Office installation is Click-to-Run or MSI-based, we follow these steps:

  1. Start Outlook.
  2. On the File menu, select Office Account.
  3. For Office Click-to-Run installations, an Update Options item is displayed.
    For MSI-based installations, the Update Options item is not displayed.
  • Check for updates of the add-in or application

Initially, it is up to the add-in developer to properly integrate his/her solution with Outlook and prevent the security prompts from happening.

If we are working with an older version of the software, we need to check with the vendor or developer of the product to get the latest version.

As the add-in developer, we can work with Redemption, which makes it easier to program our solution without triggering such prompts.

  • Group Policy and Registry settings

Within a domain, an administrator can deploy the Programmatic Access Security settings via Group Policies to prevent the security prompts from ever showing up.

Hence, the following options should be set:

  • Configure Outlook to use Group Policy Security settings

Administrative Templates-> Microsoft Outlook <version>-> Security-> Security Form Settings-> option: Outlook Security mode-> setting: Use Outlook Security Group Policy

  • Set the Guard Behavior to Automatically Approve for each prompt

Administrative Templates-> Microsoft Outlook <version>-> Security-> Security Form Settings-> Programmatic Security

This results in the following Registry keys being set:

Key: HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\<version>\Outlook\Security
Value name: AdminSecurityMode
Value type: REG_DWORD
Value: 3
Key: HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\<version>\Outlook\Security
Value name: PromptOOMSend
Value name: PromptOOMAddressBookAccess
Value name: PromptOOMAddressInformationAccess
Value name: PromptOOMMeetingTaskRequestResponse
Value name: PromptOOMSaveAs
Value name: PromptOOMFormulaAccess
Value name: PromptSimpleMAPISend
Value name: PromptSimpleMAPINameResolve
Value name: PromptSimpleMAPIOpenMessage
Value type: REG_DWORD
Value: 2

[Need more help? We’d be happy to talk to you.]

 

Conclusion

To conclude, the warning occurs when an application wants to send an email or access Outlook data in an abrupt way. Today, we saw different solutions given by our Server Administration Team to resolve this error.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF