Managing Attachment Restrictions

The Attachment restrictions page allows you to configure which email attachments to allow and which to block.
This setting can be accessed via "Incoming - Protection Settings" > "Attachment restrictions".

 

Restriction Description
Blocked Extensions Messages that have an attachment with any of the selected extensions  will be rejected.
You can add new extensions to those listed using the Add new  extension feature.
Disallowed release extensions Email users will not be allowed to release messages that contain  attachments with the selected extensions.
You can add extensions to this list using the Add new extension  feature.
Restriction options
  • Block password-protected archive attachments: If enabled, blocks messages with password protected attachments like zip files
  • Block potentially unwanted attachments: If enabled, rejects attachments that are considered dangerous or unwanted. For example, compressed executable files (e.g. UPX packers), password tools, network tools, peer-to-peer clients, remote access applications, system tools, spying tools and documents containing scripts
  • Block Attachments Containing Hidden Executables at Domain Level: If enabled, ZIP, TAR, GZIP, BZIP2 and 7Z archives (other than  those compressed with deflate64) are checked and the message will be rejected if the archive appears to contain an executable
  • Block attachments with macros: If enabled, then any message with a document based attachment (.doc, .xls, .ppt etc) that contains any  kind of macro will be rejected
Additional restrictions
  • Message link size limit (in bytes): This option restricts the amount of data that is downloaded per message. Links in messages to executable files that would be blocked as attachments are followed and the content is checked against an anti-virus database
  • Maximum MIME defects: Messages that are sent with standard email clients have no defects, whereas spam messages are often generated with poorly developed software and have many defects. Normally we reject messages with defects but if you have a need to receive defective messages, you may set a limit or disable this check. If the defective messages come from a single sender, it would generally be better to either convince the sender to fix their software or allow that sender using Manage Incoming Sender Allow list
Scanned link extensions If the Message link size limit is set (above), then links in messages to files with the selected extensions will be scanned for viruses and other malware.
You can add extensions to this list using the Add new extension feature.

 

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

Spam Quarantine

Spam quarantine holds incoming messages that the filtering system blocks. By default, the...

Viewing Incoming Mail Transactions

Once the MX record is updated, all incoming mails will go through the spam filtering service.The...

Incoming Sender Allow List

Incoming mail received from senders listed in the Allow list will always be allowed, regardless...

Filtering Settings

You can enable/disable spam quarantine and manage quarantine filter settings for incoming emails...

Train Messages as Spam or Not Spam

If you find spam is not being blocked by the filters or legitimate messages are being blocked as...