Chapter 5: Protection
79
File Extension
File Type
.msp
Microsoft Windows Installer patch
.mst
Microsoft Visual Test source files
.pcd
Photo CD image, Microsoft Visual compiled script
.pif
Shortcut to MS-DOS programs
.reg
Registration entries
.scr
Screen saver
.sct
Windows script component
.shb
Shell Scrap object
.shs
Shell Scrap object
.url
Internet shortcut
.vb
VBscript file
.vbe
VBscript encoded script file
.vbs
VBscript file
Note:
Not all attachments considered to be dangerous are blocked by this patch. For example,
the Microsoft Access file types .mda and .mdz are not blocked, nor are zipped versions of any
of the above files.
It is good practice to quarantine all suspect content, where it can be examined individually
before deciding whether it can be safely passed on or not.
While this security patch can be useful in preventing the use of unauthorized attachments,
it is important to remember that for it to work across the user community, it depends on
everyone using a client with the patch. Therefore, to be fully protected you would need to
ensure not only that MAPI clients each contained the patch, but also prevent access via
POP3, IMAP4, or HTTP.
For more information about the Outlook Security Patch, see the knowledge base article
Q262631.
Many organizations prohibit the receipt of scripts written in Microsoft Visual Basic®
Scripting Edition (VBScripts) through e-mail. If you choose to do this, it will not prohibit
those who want to receive and run VBScripts from doing so, for they can simply ask the
sender to use a different file extension and then change it back to .vbs on arrival. It will,
however, prevent the running of VBScripts that have not been pre-arranged. If you wish to
go further in preventing the effects of VBScripts, you will need to prevent them from
running at the client at all.
Again, the best way of dealing with the threat of attachments is to educate the user
community.