Getting POP up message while accessing email though VB Script
Asked Answered
S

6

0

I am trying to read the mail through VBscript or Automation Anywhere script. I am getting a popup message "A Program is trying to access e-mail address information stored in outlook. If it is unexpected, click deny and verify your antivirus software is up-to-date"

enter image description here

POP up message while reading email through script or Automation Anywhere.

I have tried the solution from Trust Center. But Message is displaying "This feature is not supported in this version.

I have gone through the registry setting option but the path is not found. I am using O365.

So let me know the solution.

Sporogenesis answered 7/11, 2019 at 12:32 Comment(1)
Does this answer your question? How can I avoid Outlook's security warning when sending email programmatically?Relevance
E
0

You get a standard security prompt in Outlook.

There are several ways for suppressing such prompts:

  1. Use a third-party components for suppressing Outlook security warnings. See Security Manager for Microsoft Outlook for more information.

  2. Use a low-level API instead of OOM. Or any other third-party wrappers around that API, for example, Redemption.

  3. Develop a COM add-in which has access to the trusted Application object. And then communicate from a standalone application with an add-in using standard .Net tools (Remoting).

  4. Use group policy objects for setting up machines.

Eolian answered 7/11, 2019 at 14:5 Comment(0)
B
0

It's Office 365 and running on exchange protocol which is not supported by AA Client, and that why you are trying to do it using VBS.

The solution to this issue would be using Automation Anywhere Outlook Metabot. This metabot can integrate with the Outlook App and do a lot of function on email, meeting, and so on.

Beersheba answered 8/11, 2019 at 7:6 Comment(0)
G
0

I haven't done this in AA, but I have tried to do this in G1ANT. It was quite simple there, you have to use the argument ""ignorecertificateerrors"" with setting its value as true.

♥yesterday = ⟦date:dd.MM.yyyy⟧13.01.2019
mail.imap imap.gmail.com login [email protected] password     p@$$w0rD sincedate 
♥yesterday todate ♥date onlyunreadmessages true markallmessagesasread false 
ignorecertificateerrors true result ♥list 
foreach ♥element in ♥list
dialog ♥element
end

"

Gooden answered 14/11, 2019 at 10:13 Comment(0)
F
0

You can put the script between Error handling commands.

After it fails just click on allow with an object cloning command. Should work this way

Flanigan answered 15/11, 2019 at 13:46 Comment(0)
F
0

You can run the script(Assuming it to be a .vbs file) using CMD

cmd.exe /s /c start yourScript.vbs

This will execute the script asynchronously and Automation Anywhere will be free to click on allow button. And yes, you need to type cmd.exe in the shell command.

Frication answered 18/11, 2019 at 9:59 Comment(0)
M
0

This is an issue for most of the metabots users, You can refer ReadMe Perform various outlook operations.pdf file within this bots My Tasks folder. Refer Bot Store for more details: Perform various outlook operations

  1. In Outlook, click File, and then click Options.
  2. Click Trust Center, and then click Trust Center Settings.
  3. Click Programmatic Access.
  4. Select the option that you prefer. If you want to stop these warning messages permanently, select the Never warn me about suspicious activity (not recommended) option.

Note If these options are not available, exit Outlook, and then start Outlook again in elevated mode. To do this, type Outlook on the desktop or in the Start Search box, right-click the Microsoft Outlook search result, click Properties, click the Compatibility tab, and then click Run this program as an administrator.

  1. Click OK two times.

Refer the https://support.microsoft.com/en-in/help/3189806/a-program-is-trying-to-send-an-e-mail-message-on-your-behalf-warning-i for more details with screenshots.

Miniskirt answered 18/11, 2019 at 13:20 Comment(0)

© 2022 - 2024 — McMap. All rights reserved.