Microsoft has released an update that makes changes to the behavior of Excel in regards to how it handles certain file types - such as the .XLS file type used by the NOZA export.
The following article excerpt regarding this update and workarounds are provided by Microsoft, and should only be used at the sole discretion of your organizations security team and standards:
We have a few options for workarounds. These are in order from safest to riskiest. While some people in the forums have suggested rolling back the security patch, we do not recommend that option as it can leave you open to other current and future threats.
- You can unblock access for individual files you know are safe. To do this:
2. Go to the location of the downloaded file
3. Right click the file and select properties
4. At the bottom of the general tab check unblock
5. Select Apply
6. Re open the excel spread sheet and the search information will populate.
- You can make use of existing Trusted Locations capabilities in Excel 2010, 2013, and 2016 via File -> options -> Trust Center -> Trust Center Settings -> Trusted Locations.
- You can save the web html file to a trusted location on the local machine (Excel comes with a set of default trust locations). If you do not see the local folder location you trust for these files, then press “Add new location…” button and add it in the Trusted Location dialog. If the HTML document is in a trusted location the KB fix is not applied (e.g. the unsafe HTML file is not blocked).
- This approach may unblock you, but it carries some risk as files of any file type in Trusted Locations are fully trusted. If an attacker can drop files into the trusted location they can easily exploit users who open such documents. Be especially cautious when specifying a custom folder as a trusted location
Microsoft article: Excel Workbooks may not open after installing MS16-088