Thursday, February 27, 2025
HomeComputer SecurityMicrosoft Blocked 38 File Types in Outlook to Prevent User's From Downloading...

Microsoft Blocked 38 File Types in Outlook to Prevent User’s From Downloading Malware

Published on

SIEM as a Service

Follow Us on Google News

Microsoft blocked 38 file extensions in Outlook web to prevent user’s from downloading attachments with those files extensions.

Outlook contains built-in spam mail filter which prevents the junk mail getting into the inbox. Now Microsoft added 38 file extensions to BlockedFileTypes property of existing OwaMailboxPolicy objects.

Previously outlook blocked 104 file types, now Microsoft expanded it by adding additional 38 File types to enhance the security.

If these file types are added to outlook blocked extensions, then users are blocked from downloading the attachments with those file types.

Microsoft said that the “newly blocked file types are rarely used, so most organizations will not be affected by the change. However, if your users are sending and receiving affected attachments, they will report that they are no longer able to download them.”

Securing your email address is vital, in the digital world, the email address related to all activities that you do online.

Blocked Extensions – Outlook Web

Following are the new extension types blocked

Python Extensions : ".py", ".pyc", ".pyo", ".pyw", ".pyz", ".pyzw"
Powershell Extensions : ".ps1", ".ps1xml", ".ps2", ".ps2xml", ".psc1", ".psc2", ".psd1", ".psdm1", ".psd1", ".psdm1"
Digital Certificate Extension : ".cer", ".crt", ".der"
Java based Extensions : ".jar", ".jnlp"
Other Extensions : ".appcontent-ms", ".settingcontent-ms", ".cnt", ".hpj", ".website", ".webpnp", ".mcf", ".printerexport", ".pl", ".theme", ".vbp", ".xbap", ".xll", ".xnk", ".msu", ".diagcab", ".grp"

If you are using Microsoft Exchange Server account and if you want to Whitelist any blocked attachments, this can be done by contacting the administrator to make the changes in security.

If you are not using Exchange Server account, then it can be unlocked by editing windows registries.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...