Microsoft Blocked 38 File Types in Outlook to Prevent User’s From Downloading Malware

Microsoft blocked 38 file extensions in Outlook web to prevent user’s from downloading attachments with those files extensions.

Outlook contains built-in spam mail filter which prevents the junk mail getting into the inbox. Now Microsoft added 38 file extensions to BlockedFileTypes property of existing OwaMailboxPolicy objects.

Previously outlook blocked 104 file types, now Microsoft expanded it by adding additional 38 File types to enhance the security.

If these file types are added to outlook blocked extensions, then users are blocked from downloading the attachments with those file types.

Microsoft said that the “newly blocked file types are rarely used, so most organizations will not be affected by the change. However, if your users are sending and receiving affected attachments, they will report that they are no longer able to download them.”

Securing your email address is vital, in the digital world, the email address related to all activities that you do online.

Blocked Extensions – Outlook Web

Following are the new extension types blocked

Python Extensions : ".py", ".pyc", ".pyo", ".pyw", ".pyz", ".pyzw"
Powershell Extensions : ".ps1", ".ps1xml", ".ps2", ".ps2xml", ".psc1", ".psc2", ".psd1", ".psdm1", ".psd1", ".psdm1"
Digital Certificate Extension : ".cer", ".crt", ".der"
Java based Extensions : ".jar", ".jnlp"
Other Extensions : ".appcontent-ms", ".settingcontent-ms", ".cnt", ".hpj", ".website", ".webpnp", ".mcf", ".printerexport", ".pl", ".theme", ".vbp", ".xbap", ".xll", ".xnk", ".msu", ".diagcab", ".grp"

If you are using Microsoft Exchange Server account and if you want to Whitelist any blocked attachments, this can be done by contacting the administrator to make the changes in security.

If you are not using Exchange Server account, then it can be unlocked by editing windows registries.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

12 hours ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

12 hours ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

14 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

14 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

14 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

15 hours ago