Understanding Why Some Email File Attachments Are Blocked

Modified on Tue, 4 Feb at 6:07 PM

In our organization, we prioritize the security of our email communications to protect against potential threats. One of the measures we have implemented is blocking certain types of email attachments using a typical filtering rule 5.7.1. This rule helps prevent potentially harmful files from being delivered to users' inboxes.

Why We Block Certain Attachments

We block the following file types: HTML (.html), HTM (.htm), MSI (.msi), PS1 (.ps1), EXE (.exe), BAT (.bat), and COM (.com). These file types are commonly used to deliver malware and other malicious content. By blocking them, we reduce the risk of security breaches and protect our systems from potential harm. Harm, how? Each of these filetypes are executable, running a program -- which can then inject malicious software (malware) into our systems.

Emailing Prohibited File Types

Emailing these file types is strictly prohibited on our systems. We will not alter our systems in any way that weakens, circumvents, makes inferior, deletes, or halts this security filter. This measure is in place to ensure the highest level of security for our organization.

Rejection of Prohibited Emails

Emails containing these prohibited file types are rejected outright. This means that nothing is held or quarantined; the emails are essentially destroyed, rendering them unable to be released. This approach ensures that potentially harmful content does not reach our users.

Standardizing Bodies and Best Practices

Our approach aligns with recommendations from several standardizing bodies and organizations:

CISA Standards

The Cybersecurity and Infrastructure Security Agency (CISA) also provides guidance on enhancing email security. CISA's Binding Operational Directive 18-01 emphasizes the importance of email security measures, including blocking potentially harmful attachments to prevent phishing and malware attacks.

Alternative Solutions for Secure File Transmission

  1. Secure File Transfer Protocol (SFTP): SFTP is a secure version of FTP that uses SSH to encrypt data during transfer. It ensures that files are transmitted securely over the network.

  2. Web Distributed Authoring and Versioning (WebDAV): WebDAV extends HTTP to allow clients to perform remote web content authoring operations securely. It supports secure file transfers and collaboration.


Conclusion

By using these alternative solutions, you can securely transmit sensitive data and documents without relying on email attachments that could potentially execute harmful code. These methods align with industry best practices and help maintain the security and integrity of your data.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article