Sign in with Microsoft
Sign in or create an account.
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.


Microsoft Outlook client crashes when opening Microsoft Teams meetings, or mousing over meetings without opening them.


This happens because Windows Defender Exploit protection prevents Outlook from growing beyond its assigned memory. This often occurs when Windows is running the Microsoft .Net framework 3.5 and other versions of .Net framework at the same time.


Turn off Export address filtering (EAF) or Import address filtering (IAF) in Windows Defender Exploit protection: 

Method 1

Process for end-users:

  1. Close all Outlook windows and any other Office applications.

  2. In the Start menu, search, and open Windows Security.

  3. Go to App & browser control.

  4. Scroll down to the Exploit protection section and select Exploit protectionsettings.

  5. Switch from System settings to Program settings.

  6. Find outlook.exe in the list, select the entry to expand, and select Edit.

  7. Scroll to Export address filtering (EAF) and turn it off. 

  8. Scroll to Import address filtering (IAF) and turn it off.

Check if the outlook client runs correctly. If it does, remove the check next to Import address filtering (IAF) to reset it back to the default system settings. Restart Outlook and see if it is still running correctly. By doing this, you can verify whether Export or Import is causing the problem.

Method 2

Process for administrators:

To disable this security mitigation, you can use a policy XML file. This is because both Intune and System Center Configuration Manager deployment depend on this file. The following policy XML settings must be updated to explicitly disable these mitigations. You can’t simply remove the payload line from the XML file. You must also set them to false as shown below: 

<AppConfig Executable="outlook.exe">

<Payload EnableExportAddressFilterPlus="false" EnableExportAddressFilter="false"/>


For more information about how to deploy Exploit protection policies with System Center Configuration Manager, see Create and deploy an Exploit Guard policy.

For more information about how to deploy Exploit protection policies with Intune, see Protect devices using Intune.


Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?
By pressing submit, your feedback will be used to improve Microsoft products and services. Your IT admin will be able to collect this data. Privacy Statement.

Thank you for your feedback!