{"id":353673,"date":"2024-09-18T09:08:26","date_gmt":"2024-09-18T09:08:26","guid":{"rendered":"https:\/\/www.ninjaone.com\/script-hub\/restreindre-l-acces-a-python-dans-excel-powershell\/"},"modified":"2024-10-13T19:03:11","modified_gmt":"2024-10-13T19:03:11","slug":"restreindre-l-acces-a-python-dans-excel-powershell","status":"publish","type":"script_hub","link":"https:\/\/www.ninjaone.com\/fr\/script-hub\/restreindre-l-acces-a-python-dans-excel-powershell\/","title":{"rendered":"Comment restreindre l&rsquo;acc\u00e8s \u00e0 Python dans Microsoft Excel \u00e0 l&rsquo;aide de PowerShell"},"content":{"rendered":"<p>Dans le monde du travail moderne, la s\u00e9curit\u00e9 des donn\u00e9es et la gestion des acc\u00e8s sont devenues de plus en plus cruciales, en particulier parce que les entreprises int\u00e8grent divers langages et outils de programmation dans leurs activit\u00e9s quotidiennes.<\/p>\n<p>L&rsquo;une de ces int\u00e9grations est l&rsquo;utilisation de Python dans Microsoft Excel, une fonction puissante qui peut am\u00e9liorer la productivit\u00e9, mais qui pr\u00e9sente \u00e9galement des risques potentiels pour la s\u00e9curit\u00e9. Pour les professionnels de l&rsquo;informatique et les <a href=\"https:\/\/www.ninjaone.com\/fr\/quest-ce-quun-msp\" target=\"_blank\" rel=\"noopener\">fournisseurs de services g\u00e9r\u00e9s (MSP)<\/a>, la gestion et la restriction de l&rsquo;acc\u00e8s \u00e0 Python dans Excel sont essentielles au maintien d&rsquo;un environnement s\u00e9curis\u00e9.<\/p>\n<p>Cet article de blog explore un script <a href=\"https:\/\/www.ninjaone.com\/fr\/it-hub\/endpoint-management\/qu-est-ce-que-powershell\/\" target=\"_blank\" rel=\"noopener\">PowerShell<\/a> con\u00e7u <strong>pour contr\u00f4ler l&rsquo;utilisation de Python dans Excel<\/strong>, en veillant \u00e0 ce que les protocoles de s\u00e9curit\u00e9 soient respect\u00e9s sans compromettre la fonctionnalit\u00e9.<\/p>\n<h2>Contexte<\/h2>\n<p>Avec la popularit\u00e9 croissante de Python dans l&rsquo;analyse et l&rsquo;automatisation des donn\u00e9es, son int\u00e9gration dans Excel offre aux utilisateurs des capacit\u00e9s avanc\u00e9es. Cependant, cette int\u00e9gration introduit \u00e9galement des vuln\u00e9rabilit\u00e9s potentielles, en particulier si des scripts Python sont ex\u00e9cut\u00e9s sans surveillance ad\u00e9quate.<\/p>\n<p>Les professionnels de l&rsquo;informatique et les MSP doivent trouver un \u00e9quilibre entre les avantages des capacit\u00e9s de Python et la n\u00e9cessit\u00e9 de prot\u00e9ger les donn\u00e9es sensibles. Le script PowerShell pr\u00e9sent\u00e9 ici offre une solution en permettant aux administrateurs de restreindre l&rsquo;utilisation de Python dans Excel, soit en activant des invites de s\u00e9curit\u00e9, soit en bloquant compl\u00e8tement l&rsquo;acc\u00e8s \u00e0 Python, soit en revenant aux param\u00e8tres par d\u00e9faut de Microsoft.<\/p>\n<h2>Le script\u00a0:<\/h2>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\">&lt;#\r\n.SYNOPSIS\r\n    Restricts the use of Python in Excel for all users. By default it'll enable a security prompt but does have the option to block or to set it back to the Microsoft default (no warnings or prompts).\r\n.DESCRIPTION\r\n    Restricts the use of Python in Excel for all users. By default it'll enable a security prompt but does have the option to block or to set it back to the Microsoft default (no warnings or prompts).\r\n.EXAMPLE\r\n    (No Parameters)\r\n    \r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1001\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 1\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1002\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 1\r\n    Set Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1003\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings to 1\r\n\r\nPARAMETER: -Block\r\n    Blocks the use of Python in Excel.\r\n.EXAMPLE\r\n    -Block\r\n\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1001\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 2\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1002\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 2\r\n    Set Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1003\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings to 2\r\n\r\nPARAMETER: -IncludeNewUsers\r\n    Adds the registry key to the Default Profile so that this change carriers over when new accounts are created.\r\n.EXAMPLE\r\n    -IncludeNewUsers\r\n\r\n    Set Registry::HKEY_USERS\\DefaultProfile\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings to 1\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1001\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 1\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1002\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 1\r\n    Set Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1003\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings to 1\r\n\r\nPARAMETER: -ChangeBackToMicrosoftDefault\r\n    Resets the setting\/restriction back to the Microsoft Default (enabled with no security prompt).\r\n.EXAMPLE\r\n    -ChangeBackToMicrosoftDefault\r\n\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1001\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 0\r\n    Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1002\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings changed from 1 to 0\r\n    Set Registry::HKEY_USERS\\S-1-5-21-3870645062-3653562310-3850680542-1003\\software\\policies\\microsoft\\office\\16.0\\excel\\security\\PythonFunctionWarnings to 0\r\n.LINK\r\n    https:\/\/support.microsoft.com\/en-us\/office\/data-security-and-python-in-excel-33cc88a4-4a87-485e-9ff9-f35958278327\r\n.OUTPUTS\r\n    None\r\n.NOTES\r\n    Minimum OS Architecture Supported: Windows 8.1, Server 2012\r\n    Release Notes: Initial Release\r\nBy using this script, you indicate your acceptance of the following legal terms as well as our Terms of Use at https:\/\/www.ninjaone.com\/terms-of-use.\r\n    Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms. \r\n    Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party. \r\n    Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library or website belonging to or under the control of any other software provider. \r\n    Warranty Disclaimer: The script is provided \u201cas is\u201d and \u201cas available\u201d, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations. \r\n    Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks. \r\n    Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script. \r\n    EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).\r\n#&gt;\r\n\r\n[CmdletBinding()]\r\nparam (\r\n    [Parameter()]\r\n    [Switch]$Block = [System.Convert]::ToBoolean($env:blockPython),\r\n    [Parameter()]\r\n    [Switch]$IncludeNewUsers = [System.Convert]::ToBoolean($env:includeNewUsers),\r\n    [Parameter()]\r\n    [Switch]$ChangeBackToMicrosoftDefault = [System.Convert]::ToBoolean($env:changeBackToMicrosoftDefaultSetting)\r\n)\r\n\r\nbegin {\r\n\r\n    # If incompatible options are detected error out\r\n    if($Block -and $ChangeBackToMicrosoftDefault){\r\n        Write-Error \"-ChangeBackToMicrosoftDefault and -Block cannot be used together. The 'Change Back To Microsoft Default' option is to set Python in Excel back to how Microsoft ships the feature (with all security warnings disabled).\"\r\n        exit 1\r\n    }\r\n\r\n    # Write a warning message for the least secure option\r\n    if($ChangeBackToMicrosoftDefault){\r\n        Write-Warning \"Changing the setting back to the default. All Python security warnings will be disabled...\"\r\n    }\r\n\r\n    function Test-IsElevated {\r\n        $id = [System.Security.Principal.WindowsIdentity]::GetCurrent()\r\n        $p = New-Object System.Security.Principal.WindowsPrincipal($id)\r\n        $p.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)\r\n    }\r\n\r\n    # Handy registry setting function\r\n    function Set-HKProperty {\r\n        param (\r\n            $Path,\r\n            $Name,\r\n            $Value,\r\n            [ValidateSet('DWord', 'QWord', 'String', 'ExpandedString', 'Binary', 'MultiString', 'Unknown')]\r\n            $PropertyType = 'DWord'\r\n        )\r\n        if (-not $(Test-Path -Path $Path)) {\r\n            # Check if path does not exist and create the path\r\n            New-Item -Path $Path -Force | Out-Null\r\n        }\r\n        if ((Get-ItemProperty -Path $Path -Name $Name -ErrorAction SilentlyContinue)) {\r\n            # Update property and print out what it was changed from and changed to\r\n            $CurrentValue = (Get-ItemProperty -Path $Path -Name $Name -ErrorAction SilentlyContinue).$Name\r\n            try {\r\n                Set-ItemProperty -Path $Path -Name $Name -Value $Value -Force -Confirm:$false -ErrorAction Stop | Out-Null\r\n            }\r\n            catch {\r\n                Write-Error \"[Error] Unable to Set registry key for $Name please see below error!\"\r\n                Write-Error $_\r\n                exit 1\r\n            }\r\n            Write-Host \"$Path\\$Name changed from $CurrentValue to $($(Get-ItemProperty -Path $Path -Name $Name -ErrorAction SilentlyContinue).$Name)\"\r\n        }\r\n        else {\r\n            # Create property with value\r\n            try {\r\n                New-ItemProperty -Path $Path -Name $Name -Value $Value -PropertyType $PropertyType -Force -Confirm:$false -ErrorAction Stop | Out-Null\r\n            }\r\n            catch {\r\n                Write-Error \"[Error] Unable to Set registry key for $Name please see below error!\"\r\n                Write-Error $_\r\n                exit 1\r\n            }\r\n            Write-Host \"Set $Path\\$Name to $($(Get-ItemProperty -Path $Path -Name $Name -ErrorAction SilentlyContinue).$Name)\"\r\n        }\r\n    }\r\n\r\n    # This function will gather all the user profiles on the system for use later\r\n    function Get-UserHives {\r\n        param (\r\n            [Parameter()]\r\n            [ValidateSet('AzureAD', 'DomainAndLocal', 'All')]\r\n            [String]$Type = \"All\",\r\n            [Parameter()]\r\n            [String[]]$ExcludedUsers,\r\n            [Parameter()]\r\n            [switch]$IncludeDefault\r\n        )\r\n    \r\n        # User account SID's follow a particular patter depending on if they're azure AD or a Domain account or a local \"workgroup\" account.\r\n        $Patterns = switch ($Type) {\r\n            \"AzureAD\" { \"S-1-12-1-(\\d+-?){4}$\" }\r\n            \"DomainAndLocal\" { \"S-1-5-21-(\\d+-?){4}$\" }\r\n            \"All\" { \"S-1-12-1-(\\d+-?){4}$\" ; \"S-1-5-21-(\\d+-?){4}$\" } \r\n        }\r\n    \r\n        # We'll need the NTuser.dat file to load each users registry hive. So we grab it if their account sid matches the above pattern. \r\n        $UserProfiles = Foreach ($Pattern in $Patterns) { \r\n            Get-ItemProperty \"HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\*\" |\r\n                Where-Object { $_.PSChildName -match $Pattern } | \r\n                Select-Object @{Name = \"SID\"; Expression = { $_.PSChildName } },\r\n                @{Name = \"UserName\"; Expression = { \"$($_.ProfileImagePath | Split-Path -Leaf)\" } }, \r\n                @{Name = \"UserHive\"; Expression = { \"$($_.ProfileImagePath)\\NTuser.dat\" } }, \r\n                @{Name = \"Path\"; Expression = { $_.ProfileImagePath } }\r\n        }\r\n    \r\n        # There are some situations where grabbing the .Default user's info is needed.\r\n        switch ($IncludeDefault) {\r\n            $True {\r\n                $DefaultProfile = \"\" | Select-Object UserName, SID, UserHive, Path\r\n                $DefaultProfile.UserName = \"Default\"\r\n                $DefaultProfile.SID = \"DefaultProfile\"\r\n                $DefaultProfile.Userhive = \"$env:SystemDrive\\Users\\Default\\NTUSER.DAT\"\r\n                $DefaultProfile.Path = \"$env:SystemDrive\\Users\\Default\"\r\n    \r\n                $DefaultProfile | Where-Object { $ExcludedUsers -notcontains $_.UserName }\r\n            }\r\n        }\r\n    \r\n        $UserProfiles | Where-Object { $ExcludedUsers -notcontains $_.UserName }\r\n    }\r\n}\r\nprocess {\r\n    if (-not (Test-IsElevated)) {\r\n        Write-Error -Message \"Access Denied. Please run with Administrator privileges.\"\r\n        exit 1\r\n    }\r\n\r\n    # If we're only asked to set it for existing users we won't include the default registry hive\r\n    if($IncludeNewUsers){\r\n        $UserProfiles = Get-UserHives -Type \"All\" -IncludeDefault\r\n    }else{\r\n        $UserProfiles = Get-UserHives -Type \"All\"\r\n    }\r\n    \r\n    $Key = \"software\\policies\\microsoft\\office\\16.0\\excel\\security\"\r\n    $PropertyName = \"PythonFunctionWarnings\"\r\n\r\n    if($ChangeBackToMicrosoftDefault){\r\n        # No Prompt and unlocked\r\n        $Value = 0\r\n    }\r\n\r\n    # This is the default option for the script\r\n    if(-not ($ChangeBackToMicrosoftDefault) -and -not ($Block)){\r\n        # Prompt\r\n        $Value = 1\r\n    }\r\n    \r\n    if($Block){\r\n        # Block\r\n        $Value = 2\r\n    }\r\n\r\n    # Loop through each profile on the machine\r\n    Foreach ($UserProfile in $UserProfiles) {\r\n        # Load User ntuser.dat if it's not already loaded\r\n        If (($ProfileWasLoaded = Test-Path Registry::HKEY_USERS\\$($UserProfile.SID)) -eq $false) {\r\n            Start-Process -FilePath \"cmd.exe\" -ArgumentList \"\/C reg.exe LOAD HKU\\$($UserProfile.SID) `\"$($UserProfile.UserHive)`\"\" -Wait -WindowStyle Hidden\r\n        }\r\n\r\n        Set-HKProperty -Path \"Registry::HKEY_USERS\\$($UserProfile.SID)\\$Key\" -Name $PropertyName -Value $Value\r\n        \r\n        # Unload NTuser.dat\r\n        If ($ProfileWasLoaded -eq $false) {\r\n            [gc]::Collect()\r\n            Start-Sleep 1\r\n            Start-Process -FilePath \"cmd.exe\" -ArgumentList \"\/C reg.exe UNLOAD HKU\\$($UserProfile.SID)\" -Wait -WindowStyle Hidden | Out-Null\r\n        }\r\n    }\r\n}\r\nend {\r\n    \r\n    \r\n    \r\n}<\/pre>\n<p>&nbsp;<\/p>\n\n<div class=\"blog-cta-new blog-cta-style-1\"><div class=\"cta-left\"><h2><\/h2><p><\/p><\/div><div class=\"cta-right\"><a class=\"button\" href=\"\"><\/a><\/div><\/div>\n<h2>Description d\u00e9taill\u00e9e<\/h2>\n<p>Le script PowerShell fourni est con\u00e7u pour permettre aux administrateurs de contr\u00f4ler la fonctionnalit\u00e9 de Python dans Excel. Voici une description \u00e9tape par \u00e9tape du fonctionnement du script :<\/p>\n<h3>1. Param\u00e8tres du script :<\/h3>\n<ul>\n<li><strong>-Block<\/strong>: Ce param\u00e8tre bloque l&rsquo;utilisation de Python dans Excel en attribuant la valeur 2 \u00e0 la cl\u00e9 de registre PythonFunctionWarnings, emp\u00eachant ainsi toute ex\u00e9cution de Python.<\/li>\n<li><strong>-IncludeNewUsers<\/strong>: Lorsque ce param\u00e8tre est utilis\u00e9, le script applique \u00e9galement la restriction aux nouveaux profils d&rsquo;utilisateur, ce qui garantit que les futurs utilisateurs cr\u00e9\u00e9s sur le syst\u00e8me h\u00e9ritent des m\u00eames param\u00e8tres.<\/li>\n<li><strong>-ChangeBackToMicrosoftDefault<\/strong>: Cette option r\u00e9initialise la cl\u00e9 de registre \u00e0 sa valeur par d\u00e9faut (0), ce qui permet \u00e0 Python de s&rsquo;ex\u00e9cuter sans aucune invite ou avertissement de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<h3>2. Manipulation du registre :<\/h3>\n<ul>\n<li>Le script agit en modifiant le registre Windows, en ciblant sp\u00e9cifiquement la cl\u00e9 PythonFunctionWarningskey situ\u00e9e sous les param\u00e8tres de s\u00e9curit\u00e9 d&rsquo;Excel. En fonction des param\u00e8tres transmis, le script attribue \u00e0 cette cl\u00e9 la valeur 0, 1 ou 2, ce qui correspond respectivement \u00e0 l&rsquo;absence d&rsquo;avertissement, \u00e0 une invite de s\u00e9curit\u00e9 ou \u00e0 un blocage complet.<\/li>\n<\/ul>\n<h3>3. Gestion du profil de l&rsquo;utilisateur:<\/h3>\n<ul>\n<li>Le script r\u00e9cup\u00e8re tous les profils d&rsquo;utilisateurs sur le syst\u00e8me et applique les modifications du registre en cons\u00e9quence. Il comprend \u00e9galement une fonction permettant de charger et de d\u00e9charger le fichier NTUSER.DAT pour chaque profil d&rsquo;utilisateur, ce qui garantit que les modifications sont appliqu\u00e9es m\u00eame si l&rsquo;utilisateur n&rsquo;est pas connect\u00e9.<\/li>\n<\/ul>\n<h3>4. Gestion des erreurs et v\u00e9rification de l&rsquo;\u00e9l\u00e9vation :<\/h3>\n<ul>\n<li>Le script v\u00e9rifie s&rsquo;il est ex\u00e9cut\u00e9 avec des privil\u00e8ges \u00e9lev\u00e9s (droits d&rsquo;administrateur) et se termine par un message d&rsquo;erreur si ce n&rsquo;est pas le cas. Ceci est crucial car la modification du registre n\u00e9cessite de tels privil\u00e8ges.<\/li>\n<\/ul>\n<h2>Cas d&rsquo;utilisation potentiels<\/h2>\n<p>Imaginez une entreprise MSP qui g\u00e8re l&rsquo;infrastructure informatique d&rsquo;une grande entreprise. Elle a r\u00e9cemment introduit l&rsquo;int\u00e9gration de Python dans Excel pour l&rsquo;analyse avanc\u00e9e des donn\u00e9es, mais est pr\u00e9occup\u00e9e par les risques potentiels de l&rsquo;ex\u00e9cution non r\u00e9glement\u00e9e de scripts Python.<\/p>\n<p>En d\u00e9ployant ce script PowerShell, l&rsquo;entreprise MSP peut appliquer des invites de s\u00e9curit\u00e9 \u00e0 tous les comptes d&rsquo;utilisateurs, garantissant que toute tentative d&rsquo;ex\u00e9cution de Python dans Excel n\u00e9cessite une approbation explicite. De plus, elle peut bloquer enti\u00e8rement l&rsquo;ex\u00e9cution de Python sur les machines qui traitent des informations sensibles, telles que des donn\u00e9es financi\u00e8res, afin de r\u00e9duire davantage les risques.<\/p>\n<h2>Comparaisons<\/h2>\n<p>Il existe d&rsquo;autres m\u00e9thodes pour restreindre l&rsquo;utilisation de Python dans Excel, comme les param\u00e8tres de strat\u00e9gie de groupe ou les modifications manuelles du registre. Toutefois, ces approches n&rsquo;offrent pas le m\u00eame niveau de granularit\u00e9 ou d&rsquo;automatisation que le script PowerShell.<\/p>\n<p>Par exemple, si la strat\u00e9gie de groupe peut \u00eatre efficace, elle peut ne pas s&rsquo;appliquer facilement \u00e0 tous les profils d&rsquo;utilisateurs ou permettre un blocage s\u00e9lectif par rapport \u00e0 une invitation. Les modifications manuelles du registre, en revanche, sont sujettes aux erreurs et peu pratiques pour les d\u00e9ploiements \u00e0 grande \u00e9chelle.<\/p>\n<h2>FAQ<\/h2>\n<h3>1. Que se passe-t-il si j&rsquo;utilise les param\u00e8tres -Block et -ChangeBackToMicrosoftDefault ensemble ?<\/h3>\n<ul>\n<li>Le script se terminera par une erreur, car ces deux options sont incompatibles. Il n&rsquo;est pas possible de bloquer Python et de r\u00e9tablir les param\u00e8tres par d\u00e9faut simultan\u00e9ment.<\/li>\n<\/ul>\n<h3>2. Dois-je ex\u00e9cuter le script en tant qu&rsquo;administrateur ?<\/h3>\n<ul>\n<li>Oui, le script n\u00e9cessite des privil\u00e8ges \u00e9lev\u00e9s pour modifier le registre.<\/li>\n<\/ul>\n<h3>3. Puis-je appliquer automatiquement ces param\u00e8tres aux nouveaux utilisateurs ?<\/h3>\n<ul>\n<li>Oui, en utilisant le param\u00e8tre -IncludeNewUsers, le script s&rsquo;assure que les nouveaux profils d&rsquo;utilisateurs h\u00e9ritent des m\u00eames restrictions Python.<\/li>\n<\/ul>\n<h2>Implications<\/h2>\n<p>Restreindre l&rsquo;utilisation de Python dans Excel peut avoir des cons\u00e9quences importantes sur la s\u00e9curit\u00e9 des donn\u00e9es au sein d&rsquo;une entreprise. En imposant des messages de s\u00e9curit\u00e9 ou en bloquant compl\u00e8tement Python, les administrateurs informatiques peuvent emp\u00eacher l&rsquo;ex\u00e9cution de scripts non autoris\u00e9s ou malveillants, prot\u00e9geant ainsi les donn\u00e9es sensibles. Toutefois, il est \u00e9galement essentiel de tenir compte de l&rsquo;impact sur la productivit\u00e9, car des politiques trop restrictives peuvent entraver des cas d&rsquo;utilisation l\u00e9gitimes.<\/p>\n<h2>Recommandations<\/h2>\n<p>Lors de l&rsquo;utilisation de ce script, il est conseill\u00e9 de :<\/p>\n<ul>\n<li>Tester les param\u00e8tres sur un petit groupe d&rsquo;utilisateurs avant de les d\u00e9ployer \u00e0 grande \u00e9chelle afin de vous assurer qu&rsquo;ils ne perturbent pas le fonctionnement normal de l&rsquo;entreprise.<\/li>\n<li>R\u00e9viser et mettre \u00e0 jour r\u00e9guli\u00e8rement les restrictions en fonction de l&rsquo;\u00e9volution des besoins de l&rsquo;entreprise en mati\u00e8re de s\u00e9curit\u00e9 et de l&rsquo;introduction de nouveaux outils ou de nouvelles pratiques.<\/li>\n<li>Penser \u00e0 utiliser le param\u00e8tre -IncludeNewUsers pour maintenir des politiques de s\u00e9curit\u00e9 coh\u00e9rentes dans l&rsquo;ensemble de l&rsquo;entreprise.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>La gestion de l&rsquo;int\u00e9gration de Python dans Excel est une t\u00e2che essentielle pour les professionnels de l&rsquo;informatique et les MSP, en particulier dans les environnements o\u00f9 la <a href=\"https:\/\/www.ninjaone.com\/fr\/blog\/les-principes-de-la-protection-des-donnees-europe-et-amerique-du-nord\/\" target=\"_blank\" rel=\"noopener\">s\u00e9curit\u00e9 des donn\u00e9es<\/a> est primordiale. Ce script PowerShell fournit une solution performante pour contr\u00f4ler l&rsquo;utilisation de Python, offrant une flexibilit\u00e9 et une automatisation que d&rsquo;autres m\u00e9thodes peuvent ne pas avoir.<\/p>\n<p>Pour ceux qui souhaitent optimiser et s\u00e9curiser davantage leurs op\u00e9rations informatiques, <a href=\"https:\/\/www.ninjaone.com\/fr\/\" target=\"_blank\" rel=\"noopener\">NinjaOne<\/a> propose des outils et des services complets con\u00e7us pour r\u00e9pondre aux besoins de la gestion informatique moderne. Qu&rsquo;il s&rsquo;agisse d&rsquo;automatisation, de surveillance ou de gestion de la s\u00e9curit\u00e9, NinjaOne peut vous aider \u00e0 maintenir une infrastructure informatique s\u00fbre et <a href=\"https:\/\/www.ninjaone.com\/fr\/efficacite\" target=\"_blank\" rel=\"noopener\">efficace<\/a>.<\/p>\n","protected":false},"author":35,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_lmt_disableupdate":"","_lmt_disable":""},"operating_system":[4212],"use_cases":[4289],"class_list":["post-353673","script_hub","type-script_hub","status-publish","hentry","script_hub_category-windows","use_cases-gestion-des-utilisateurs-et-des-acces"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub\/353673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub"}],"about":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/types\/script_hub"}],"author":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/comments?post=353673"}],"wp:attachment":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/media?parent=353673"}],"wp:term":[{"taxonomy":"script_hub_category","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/operating_system?post=353673"},{"taxonomy":"use_cases","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/use_cases?post=353673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}