Chapter 14. Securing Your System, Messages, and Identity

Configuring HTML Message Handling 356

Protecting Messages with Digital Signatures 360

Signing Messages 368

Encrypting Messages 387

Protecting Data with Information Rights Management 393

MICROSOFT Outlook 2010 includes features that can help protect your system from computer viruses and malicious programs, prevent others from using email to impersonate you, and prevent the interception of sensitive messages. Some of these features—such as the ability to block specific types of attachments—were first introduced in Outlook 2002. Other security features—such as the ability to block external images in HTML-based messages—were introduced in Outlook 2003. This feature enables Outlook to block Hypertext Markup Language (HTML) messages sent by spammers to identify valid recipient addresses. These messaging security features were extended and enhanced in Outlook 2007 and are also present in Outlook 2010.

This chapter begins with a look at the settings you can use to control HTML content. Because HTML messages can contain malicious scripts or even HTML code that can easily affect your system, the capability to handle these messages securely in Outlook 2010 is extremely important.

This chapter also discusses the use of both digital signatures and encryption. You can use a digital signature to authenticate your messages, proving to the recipient that a message indeed came from you, not from someone trying to impersonate you. Outlook 2010 enables you to encrypt outgoing messages to prevent them from being intercepted by unintended recipients; you can also read encrypted messages sent to you by others. In this chapter, you’ll learn how to obtain and install certificates to send encrypted messages and how to share keys with others so that you can exchange encrypted messages.

Spammers are always looking for new methods to identify valid email addresses. Knowing that a given address actually reaches someone is one step in helping spammers maintain their lists. If a particular address doesn’t generate a response in some way, it’s more likely to be removed from the list.

One way that spammers identify valid addresses is through the use of web beacons. Spammers often send HTML messages that contain links to external content, such as pictures or sound clips. When you display the message, your mail program retrieves the remote data to display it, and the remote server then validates your address. These external elements are the web beacons.

Since Outlook 2003, Outlook blocks external content from HTML messages by default, displaying a red X in the place of the missing content. The result is that these web beacons no longer work because the external content is not accessed when the message is displayed. Messages that fit criteria for the Safe Recipients and Safe Senders lists are treated as exceptions—the external content for these messages is not blocked.

When you preview an image in the Reading pane for which Outlook 2010 has blocked external content, Outlook 2010 displays a message in the InfoBar, indicating that the blocking occurred (see Figure 14-1). You can click the InfoBar and choose Download Pictures to view the external content. Outlook 2010 then downloads and displays the content in the Reading pane. The same is true if you open a message; Outlook 2010 displays a warning message, telling you that the content was blocked (see Figure 14-2). You can click the warning message and choose Download Pictures to download and view the content. Because Outlook 2010 blocks external content for messages in this way, you can take advantage of content blocking without using the Reading pane.

If you edit, forward, or reply to a message containing blocked content (from an open message or a message displayed in the Reading pane), Outlook 2010 displays a warning dialog box indicating that the external content will be downloaded if you continue. You can click OK to download the content and continue with the reply or forward, click No to tell Outlook 2010 to forward the content as text without downloading the content, or click Cancel to not open the message or download the content (see Figure 14-3). Thus, you can reply to or forward a message without downloading the external content.

Outlook 2010 provides a few options to control the way content blocking works. To configure these options, click File, Options, Trust Center, Trust Center Settings, and then click the Automatic Download page. Figure 14-4 shows the resulting Automatic Download settings page.

Configure content blocking using the following options:

To take advantage of the exceptions for external content, you must add the message’s originating address to the Safe Senders list, add the recipient address to the Safe Recipients list, or add the remote domain to the Trusted Sites zone in Internet Options (in the Windows Security Center).

Outlook 2010 supports the use of digital signatures to sign messages and validate their authenticity. For example, you can sign a sensitive message digitally so that the recipient can know with relative certainty that the message came from you and that no one is impersonating you by using your email address. This section of the chapter explains digital certificates and signatures and how to use them in Outlook 2010.

A digital certificate is the mechanism that makes digital signatures possible. Depending on its assigned purpose, you can use a digital certificate for a variety of tasks, including the following:

A digital certificate binds the identity of the certificate’s owner to a pair of keys, one public and one private. At a minimum, a certificate contains the following information:

The certificate can also include other identifying information, such as the owner’s email address, postal address, country, or gender.

The two keys are the aspect of the certificate that enables authentication and encryption. The private key resides on your computer and is a large unique number. The certificate contains the public key, which you must give to recipients to whom you want to send authenticated or encrypted messages.

Think of it as having a “read content key” and a “create content key”: one key (the private key) lets you create encrypted content, and the other key (the public key) lets others read the content encrypted with the private key.

Outlook 2010 uses slightly different methods for authenticating messages with digital signatures and for encrypting messages, as you’ll see later in the chapter. Before you begin either task, however, you must first obtain a certificate.

Digital certificates are issued by certification authorities (CAs). In most cases, you obtain your email certificate from a public CA such as VeriSign or Thawte. However, systems based on Windows servers running Certificate Services can function as CAs, providing certificates to clients who request them. Check with your system administrator to determine whether your enterprise includes a CA. If it doesn’t, you need to obtain your certificate from a public CA, usually at a minimal cost. Certificates are typically good for one year and must be renewed at the end of that period.

If you need to obtain your certificate from a public CA, point your web browser to the CA website, such as www.verisign.com or www.thawte.com. Follow the instructions provided by the site to obtain a certificate for signing and encrypting your email (see Figure 14-5, for example). The certificate might not be issued immediately; instead, the CA might send you an email message containing a Uniform Resource Locator (URL) that links to a page where you can retrieve the certificate. When you connect to that page, the CA installs the certificate on your system.

If you’re obtaining a certificate from a CA on your network, the method that you use depends on whether the network includes an enterprise CA or a stand-alone CA.

If you’re using Windows Vista or Windows 7 as a domain client on a network with an enterprise CA, follow these steps to request a certificate:

To request a certificate from a stand-alone CA on your network (or if your computer is part of a workgroup), point your web browser to http://<server>/certsrv, where <server> is the name or Internet Protocol (IP) address of the CA. The CA provides a web page with a form that you must fill out to request the certificate (see Figure 14-6). Follow the CA prompts to request and obtain the certificate. The site includes a link that you can click to install the certificate.

You can copy your certificate from one computer to another, which means that you can use it on more than one system. The process is simple: You first export (back up) your certificate to a file, and then you import the certificate into the other system. The following sections explain how to export and import certificates.

Whether you obtained your certificate from a public CA or from a CA on your network, you should back it up in case your system suffers a drive failure or if the certificate is lost or corrupted. You also should have a backup of the certificate so that you can export it to any other computers you use on a regular basis, such as a notebook computer or your home computer. In short, you need the certificate on every computer from which you plan to digitally sign or encrypt messages. To back up your certificate, you can use Outlook 2010, Internet Explorer, or the Certificates console. Each method offers the same capabilities; you can use any one of them.

Follow these steps to use Outlook 2010 to back up your certificate to a file:

If you want to use either Internet Explorer or the Certificates console to back up a certificate, use the Certificate Export Wizard, as follows:

You can install (or reinstall) a certificate from a backup copy of the certificate file by using Outlook 2010, Internet Explorer, or the Certificates console. You must import the certificate to your computer from the backup file.

The following procedure assumes that you’re installing the certificate using Outlook 2010:

You can also import a certificate to your computer from a backup file using either Internet Explorer or the Certificates console, as explained here:

Now that you have a certificate on your system, you’re ready to start digitally signing your outgoing messages so that recipients can verify your identity. When you send a digitally signed message, Outlook 2010 sends the original message and an encrypted copy of the message with your digital signature. The recipient’s email application compares the two versions of the message to determine whether they are the same. If they are, no one has tampered with the message. The digital signature also enables the recipient to verify that the message is from you.

Follow these steps to sign an outgoing message digitally:

To save time, you can configure your security settings to apply globally to all messages, changing settings only as needed for certain messages. In Outlook 2010, click File, Options, Trust Center, Trust Center Settings, and then click E-Mail Security. On the E-Mail Security page, shown in Figure 14-11, you can set security options using the following list as a guide.

Although in most cases you need only one set of Outlook 2010 security settings, you can create and use multiple security profiles. For example, you might send most of your secure messages to other Exchange Server users and only occasionally send secure messages to Internet recipients. In that situation, you might maintain two sets of security settings: one that uses Exchange Server security and another that uses S/MIME, each with different certificates and hash algorithms (the method used to secure the data).

You can configure security profiles using the Change Security Settings dialog box, which you access through the Settings button on the E-Mail Security page of the Trust Center dialog box. One of your security profiles acts as the default, but you can select a different security profile any time it’s needed.

Follow these steps to create and manage your security profiles:

  1. In Outlook 2010, click File, Options, Trust Center, Trust Center Settings, and then click E-Mail Security.

  2. Click Settings to display the Change Security Settings dialog box, shown in Figure 14-12. Set the options described in the following section as needed. If you are creating a new set of settings, start by clicking New prior to changing settings because selecting New clears all other setting values.

  3. Click OK to close the Change Security Settings dialog box.

  4. In the Default Setting drop-down list on the E-Mail Security page, select the security profile you want to use by default and then click OK.

Tip

INSIDE OUT You need a faster way to sign a message digitally

If you don’t send a lot of digitally signed messages, you might not mind going through all the steps for getting to the Security Properties dialog box to sign a message that you compose. However, if you frequently send digitally signed messages but don’t want to configure Outlook 2010 to sign all messages by default, all the clicking involved in signing the message can be onerous. To sign your messages digitally faster, consider adding a toolbar button that lets you toggle a digital signature with a single click by following these steps:

Now whenever you need to digitally sign or encrypt a message, you can click the appropriate button on the Quick Access Toolbar when you compose the message.

To have Outlook 2010 authenticate a signed message and treat it as being from a trusted sender, you must add the certificate to your list of trusted certificates. An alternative is to configure Outlook 2010 to inherit trust for a certificate from the certificate’s issuer. For example, assume that you have a CA in your enterprise. Instead of configuring each sender’s certificate to be trusted explicitly, you can configure Outlook 2010 to inherit trust from the issuing CA—in other words, Outlook 2010 will trust implicitly all certificates issued by that CA.

Follow these steps to configure the trust relationship for a certificate:

Although you might not realize it, your computer system by default includes certificates from several public CAs (typically VeriSign, Thawte, Equifax, GTE, or several others), which were installed when you installed your operating system. By default, Outlook 2010 and other applications trust certificates issued by those CAs without requiring you to trust explicitly each certificate issued by the CA.

The easiest way to view these certificates is through Internet Explorer, as follows:

If you have a personal certificate issued by a specific CA, the issuer’s certificate is installed on your computer. Messages you receive that are signed with certificates issued by the same CA inherit trust from the issuer without requiring the installation of any additional certificates. If you have not yet obtained the CA certificate from your Enterprise CA, you need to add that CA’s certificate to your system before certificates issued by that CA will be trusted.

Follow these steps to connect to a Windows-based enterprise CA to obtain the CA’s certificate and install it on your system:

The procedure just outlined assumes that the CA administrator has not customized the certificate request pages for the CA. If the pages have been customized, the actual process you must follow could be slightly different from the one described here.

The process described in the preceding section is useful when configuring CA trust for a small number of computers, but it can be impractical with a large number of computers. In these situations, you can turn to Group Policy to configure CA trust in a wider area such as an organizational unit (OU), a domain, or an entire site.

You can create a certificate trust list (CTL), which is a signed list of root CA certificates that are considered trusted, and deploy that CTL through Group Policy. This solution requires that you be running the Active Directory Domain Services (AD DP) with desktop clients running Windows XP or later as domain members.

Follow these steps on Windows Server 2008 to create and deploy the CTL:

  1. Log on to a domain controller and open the Group Policy Management console.

  2. Create a new GPO or edit an existing GPO at the necessary container in AD DS, such as an OU. Select the GPO and in the right pane, click More Actions, Edit.

  3. In the Group Policy Management Editor, expand the branch User Configuration\Policies\Windows Settings\Security Settings\Public Key Policies\Enterprise Trust.

  4. Right-click Enterprise Trust and choose New, Certificate Trust List to start the Certificate Trust List Wizard.

  5. Click Next, and then specify a name and valid duration for the CTL (both optional), as shown in Figure 14-20. Select one or more purposes for the CTL in the Designate Purposes list (in this example, choose Secure Email), and then click Next.

  6. On the Certificates In The CTL page (see Figure 14-21), click Add From Store to add certificates to the list from the server’s certificate store. Choose one or more certificates and click OK.

  7. If the certificates are stored in an X.509 file, Microsoft Serialized Certificate Store, or PKCS #7 certificate file, click Add From File, select the file, and click Open.

  8. Back on the Certificates In The CTL page, click Next. On the Signature Certificate page, select a certificate to sign the CTL. The certificate must be stored in the local computer certificate store instead of the user certificate store. Click Next after you select the certificate.

  9. If you want, you can choose the Add A Timestamp To The Data option and specify a timestamp service URL if one is available. Otherwise, click Next.

  10. If you want, enter a friendly name and description for the CTL to help identify it, click Next, and click Finish.

You can view the certificate associated with a signed message to obtain information about the issuer, the person to whom the certificate is issued, and other matters.

To do so, follow these steps:

The CA uses a certificate revocation list (CRL) to indicate the validity of certificates. If you don’t have a current CRL on your system, Outlook 2010 can treat the certificate as trusted, but it can’t validate the certificate and will indicate this when you view the signature.

You can locate the path to the CRL by examining the certificate’s properties as follows:

When you know the URL for the CRL, you can point your browser to the site to download and install the CRL. If a CA in your enterprise issued the certificate, you can obtain the CRL from the CA.

To obtain and install the CRL, follow these steps:

You can encrypt messages to prevent them from being read by unauthorized persons. Of course, it is true that with significant amounts of computing power and time, any encryption scheme can probably be broken. However, the chances of someone investing those resources in your email are pretty remote. So you can be assured that the email encryption that Outlook 2010 provides offers a relatively safe means of protecting sensitive messages against interception.

Before you can encrypt messages, you must have a certificate for that purpose installed on your computer. Typically, certificates issued for digital signing can also be used for encrypting email messages.

After you’ve obtained a certificate and installed it on your system, encrypting messages is a simple task. Getting to that point, however, depends in part on whether you’re sending messages to an Exchange Server recipient on your network or to an Internet recipient.

Before you can send an encrypted message to an Internet recipient, you must have a copy of the recipient’s public key certificate. To read the message, the recipient must have a copy of your public key certificate, which means you first need to swap public certificates.

The easiest way to swap certificates is to send a digitally signed message to the recipient and have the recipient send you a signed message in return, as outlined here:

When you receive a signed message from someone with whom you’re exchanging certificates, you must add the person to your Contacts folder to add the certificate by following these steps:

As an alternative to receiving a signed message with a certificate from another person, you might be able to obtain the person’s certificate from the issuing CA. For example, if you know that the person has a certificate from VeriSign, you can download that individual’s public key from the VeriSign website. Other public CAs offer similar services. To search for and download public keys from VeriSign (see Figure 14-27), connect to https://digitalid.verisign.com/services/client/index.html. Check the sites of other public CAs for similar links that enable you to download public keys from their servers.

The process for downloading a public key varies by CA. In general, however, you enter the person’s email address in a form to locate the certificate, and the form provides instructions for downloading the certificate. You should have no trouble obtaining the public key after you locate the certificate on the CA (there is a link to download the public key certificate from the CA to a file on your computer).

Save the public key to disk, and then follow these steps to install the key:

In response to market demands for a system andwith which companies can protect proprietary and sensitive information, Microsoft has developed an umbrella of technologies called Information Rights Management (IRM). Outlook 2010 incorporates IRM, enabling you to send messages that prevent the recipient from forwarding, copying from, or printing the message. The recipient can view the message, but the features for accomplishing these other tasks are unavailable.

There are two paths to implementing IRM with the Office system. Microsoft offers an IRM service that, as of this writing, is free. This path requires that you have a Windows Live ID to send or view IRM-protected messages. You must log in to the service with your Windows Live ID credentials to download a certificate, which Outlook 2010 uses to verify your identity and enable the IRM features. The second path is to install Microsoft Windows Server 2003 running the Rights Management Service (RMS) on Windows Server 2003, or the Active Directory Rights Management Service on Windows Server 2008. With this path, users authenticate on the server with NTLM or Windows Live ID authentication and download their IRM certificates.

The first path provides simplicity because it does not require that organizations deploy an RMS server. The second path provides more flexibility because the RMS administrator can configure company-specific IRM policies, which are then available to users. For example, you might create a policy template requiring that only users within the company domain can open all email messages protected by the policy. You can create any number of templates to suit the company’s data rights needs for the range of Office system applications and document types.

Not everyone who receives an IRM-protected message will be running Outlook 2003 or later, so Microsoft has developed the Rights Management Add-On for Internet Explorer, which enables these users to view the messages in Internet Explorer. Without this add-on, recipients cannot view IRM-protected messages. With the add-on, recipients can view the messages, but the capability to forward, copy, or print the message is disabled, just as it is in Outlook 2010.

Note

This chapter explains how to configure and use IRM in Outlook 2010 with the Microsoft IRM service. If you want to use RMS in Windows Server, you will find more information by searching technet.microsoft.com for “Active Directory Rights Management Services.” RMS provides a much richer set of features and control than the free service offered by Microsoft, but it is beyond the scope of this book.

To configure Outlook 2010 to use the IRM service and send IRM-protected messages, follow these steps:

  1. Open Outlook 2010 and start a new message. With the message form open, click File, Set Permissions, Do Not Forward.

  2. If you do not have the IRM add-on installed, Outlook 2010 displays the dialog box shown in Figure 14-28. Choose Yes, I Want To Sign Up For This Free Service From Microsoft, and then click Next.

  3. The wizard asks if you already have a Windows Live ID. If so, choose Yes and click Next to open a sign-in dialog box and enter your Windows Live credentials. If not, choose No and click Next; then follow the prompts to obtain a Windows Live ID.

  4. After you obtain a Windows Live ID and log on, Outlook 2010 displays the page shown in Figure 14-29. Choose This Is A Private Computer to obtain a certificate that you can use on your own computer. Choose This Is A Public Or Shared Computer if you need a certificate only for a limited time, such as when you are working from a public computer. Then click Accept, Finish to complete the process.

  5. Outlook displays the Select User dialog box, which in this case will likely contain only one user (the one that you just created). Click OK.

  6. Click the Message tab and note that the InfoBar in the form displays a Do Not Forward message, as shown in Figure 14-30, indicating that the message is protected by IRM.

  7. Address the message and add the message body and attachments, if any, as you would for any other message, and then send the message.