Controls whether executable files are restricted to being loaded from trusted folders only 
| Type: | Integer | 
| Saved in: | Registry | 
| Initial value: | 1, may be locked by the CAD administrator | 
 
|  
			  Value 
			  
 
		   | 
 
			  Description 
			  
 
		   | 
|  
			  0 
			  
 
		   | 
 
			  Loads executable files from any location without displaying a warning. This option maintains legacy behavior, but is not recommended. 
			  
 
		   | 
|  
			  1 
			  
 
		   | 
 
			  Loads executable files only if their location is in the trusted locations specified in the TRUSTEDPATHS system variable. Displays a warning during load requests from executable files in other locations. 
			  
 
		   | 
|  
			  2 
			  
 
		   | 
 
			   Allows executable files to be loaded only if their location is in the trusted locations specified in the TRUSTEDPATHS system variable. 
			  
 
		   | 
 
Note: Starting with AutoCAD 2026 and AutoCAD 2026-based products, when 
  
PROJECTAWARE is set to 1, this system variable is read-only and set to 2. For more information, see 
  
About Connected Support Files on setting up support files for Autodesk Docs projects. 
 
The executable file types affected by SECURELOAD include the following: 
- ARX, DBX, CRX, HDI files 
  
 
- LSP, FAS, VLX, MNL files 
  
 
- SCR files from network paths 
  
 
-  .NET assemblies 
  
 
- VBA macros (DVB files) 
  
 
-  
	 acad.rx 
  
 
- JavaScript 
  
 
- DLL files 
  
 
Important:  
  - The LEGACYCODESEARCH system variable controls whether searching for executable files includes the folder from which the program is started. 
	 
 
- The ACADLSPASDOC system variable determines whether the 
		acad.lsp or 
		acadlt.lsp file is loaded into every drawing or just the first drawing opened in a session. AutoLISP files must be located in the Support File Search Path to be found, or else a relative path must be included in the Filename parameter when using the LOAD function. 
	 
 
- The SECUREREMOTEACCESS system variable controls whether files are restricted from being accessed from internet locations or from remote servers.