Chapter 33. Security and Virus Protection

Providing Virus Protection 807

Protecting Against Viruses in Attachments 810

Configuring Blocked Attachments 815

Opening Blocked Attachments 826

Protecting Against Office Macro Viruses 827

Enabling Applications to Send Email with Outlook 828

Tips for Securing Your System 831

IF you use Microsoft Outlook 2010 on a daily basis to manage email, appointments, and contacts, losing the information that you’ve stored in Outlook 2010 could cause significant problems. Outlook 2010 data can be lost in a number of ways, from accidental deletion to file corruption to hard disk failure. In addition, a user who purchases a new computer might leave behind information when transferring data to the new machine.

This chapter examines virus protection for both the server and workstation to help you understand how to protect yourself and your network from email-borne viruses. Outlook 2010 provides features to protect against viruses in attachments, and there are several steps you can and should take to add other forms of virus protection.

Hardware and software failures are by no means the only source of anguish for the average user or administrator. Viruses and worms have become major problems for system administrators and users alike. When a major virus or worm outbreak hits, companies grind to a halt, systems shut down, system administrators turn off mail servers, and general chaos ensues.

The effects of a particularly virulent virus or worm can be devastating for a company. A virus or worm can bring your mail servers to a quick halt because of the load that it imposes on them with the sheer amount of traffic it generates. Bandwidth, both local and across wide area network (WAN) links, is affected as multiple copies of infected messages flood the network. Files can become infected, rendering them unusable and subjecting users to reinfection. This means that you must recover the files from backups, making an adequate backup strategy even more important than usual.

One often-overlooked effect that viruses have on a company is the public relations nightmare that they can create. How would your customers react if they received a flood of infected messages from your company that brought their mail servers to a screeching halt and damaged their production files? Forget for a moment the ire of your customers’ system administrators. Could your company survive the ill will generated by such a catastrophe?

At the least, your company would probably suffer serious consequences. Therefore, developing and implementing an effective virus protection strategy is as important as developing a backup strategy—perhaps even more so. When you examine your antivirus needs, approach the problem from two angles: protecting against outside infection and preventing an outgoing flood of infected messages. You can approach the former through either client-side or server-side solutions, but the latter typically requires a server-side solution.

Your first line of defense against viruses and worms should lie between your local area network (LAN) and the Internet. Many antivirus solution vendors offer perimeter security products that monitor traffic coming from the Internet and detect and block viruses in real time. With perimeter protection in place, threats may never reach your network or servers at all.

Stopping viruses before they get into your LAN is a great goal, but even the best products sometimes miss. If your organization uses Microsoft Exchange Server, you should also consider installing an Exchange Server–based antivirus solution. All the major antivirus vendors offer Exchange Server solutions, as does Microsoft, with its Microsoft Forefront suite of protection products.

In addition to detecting and removing viruses from network and Exchange Server traffic, you should implement a solution that provides real-time virus detection for your network’s file servers. These solutions scan the server for infected files as files are added or modified. For example, a remote user might upload a file containing a virus to your File Transfer Protocol (FTP) server. If local users open the file, their systems become infected and the virus begins to spread across your LAN. Catching and removing the virus as soon as the file is uploaded to the FTP server is the ideal solution. Microsoft SharePoint is another application that should be protected at the application layer. Because documents are stored in Microsoft SQL Server rather than in a file system, the operating system–level antivirus products cannot detect or protect against threats in documents uploaded by users. So you should add a SharePoint antivirus solution in addition to your operating system protection on the servers themselves.

Consider all these points as you evaluate server-side antivirus products. Some might be more important to you than others, so prioritize them and then choose an antivirus suite that best suits your needs and priorities.

In addition to blocking viruses and worms at the server, you should provide antivirus protection at each workstation, particularly if your server-side virus detection is limited. Even if you do provide a full suite of detection services at the server, client-side protection is a vital piece of any antivirus strategy. For example, suppose that your server provides virus filtering, scanning all email traffic coming from the Internet. Even so, the server might miss a new virus in a message with an attached file, perhaps because the virus definition file has not yet been updated. A user opens the infected file and infects his or her system, and the worm begins replicating across the LAN. If the user has a client-side antivirus solution in place, the worm is blocked before it can do any damage.

Use the following criteria to evaluate client-side antivirus solutions:

You’ll find several client-side antivirus products on the market. Microsoft has two offerings that might be of interest: Microsoft Security Essentials includes antivirus protection in its suite of services for home and small business computer users, and Microsoft Forefront Client Security offers similar protection for computers in an enterprise environment, although it does not scan email. Other popular products include Symantec Norton AntiVirus (www.symantec.com), McAfee VirusScan (www.mcafee.com), and Panda Antivirus for Servers and Desktops (www.pandasecurity.com). Many other products are available that offer comparable features.

In the old days, infected boot floppy disks were the most common way computer viruses were spread. Today, email is by far the most common infection mechanism. Viruses range from mostly harmless (but irritating) to severe, sometimes causing irreparable damage to your system. Worms are a more recent variation, spreading across the Internet primarily through email and by exploited operating system flaws. Worms can bog down a system by consuming the majority of the system’s resources, and they can cause the same types of damage as viruses.

Outlook 2010 provides protection against viruses and worms by letting you block certain types of attachments that are susceptible to infection. This prevents users from opening attached files that could infect their systems and execute malicious code to damage or steal data. Executable programs (.exe, .com, and .bat files) are also good examples of attachments that are primary delivery mechanisms for viruses. Many other document types are equally susceptible—Hypertext Markup Language (HTML) documents and scripts, for instance, have rapidly become favorite delivery tools for virus creators. Outlook 2010 provides two levels of protection for attachments: Level 1 and Level 2. The following sections explain these two levels, the file types assigned to each, and how to work with attachments.

Level 1 attachments arefor those that are common vectors for infection, such as executable (.exe) files. When you receive a message containing an attachment in the Level 1 group, Outlook 2010 displays the paper clip icon next to the message header, indicating that the message has an attachment, just as it does for other messages with attachments. When you click the message header, Outlook 2010 displays a message indicating that it has blocked the attachment.

You cannot open Level 1 attachments that are blocked by Outlook 2010. You can open and view the messages, but Outlook 2010 disables the interface elements that otherwise would allow you to open or save the attachments. Outlook 2010 displays a message in the InfoBar informing you that the attachment has been blocked and cannot be opened, as shown in Figure 33-1. If you forward a message with a blocked attachment, Outlook 2010 strips the attachment from the forwarded message.

Table 33-1 lists the file name extensions for Level 1 attachments. (Note that this list will change over time.)

Table 33-1. Level 1 Attachments

File Name Extension

Description

.ade

Microsoft Access project extension

.adp

Access project

.app

Executable application

.asp

Active Server Page

.bas

BASIC source code

.bat

Batch processing

.cer

Internet security certificate file

.chm

Compiled HTML help

.cmd

DOS CP/M command file; command file for Windows NT

.cnt

Windows Help file

.com

Command

.cpl

Control Panel extension

.crt

Certificate file

.csh

csh script

.der

DER-encoded X509 certificate file

.exe

Executable file

.fxp

FoxPro compiled source

.gadget

Windows gadget file

.hlp

Windows Help file

.hpj

Windows Help project file

.hta

Hypertext application

.inf

Information or setup file

.ins

Microsoft Internet Information Services (IIS) Internet communications settings

.isp

IIS Internet service provider (ISP) settings

.its

Internet document set; Internet translation

.js

JavaScript source code

.jse

JScript encoded script file

.ksh

UNIX shell script

.lnk

Windows shortcut file

.mad

Access module shortcut

.maf

Access file

.mag

Access diagram shortcut

.mam

Access macro shortcut

.maq

Access query shortcut

.mar

Access report shortcut

.mas

Access stored procedures

.mat

Access table shortcut

.mau

Media attachment unit

.mav

Access view shortcut

.maw

Access data access page

.mda

Access add-in; Microsoft MDA Access 2 workgroup

.mdb

Access application; Microsoft MDB Access database

.mde

Access MDE database file

.mdt

Access add-in data

.mdw

Access workgroup information

.mdz

Access wizard template

.msc

Microsoft Management Console (MMC) snap-in control file

.msh

Microsoft shell

.msh1

Microsoft shell

.msh2

Microsoft shell

.mshxml

Microsoft shell

.msh1xml

Microsoft shell

.msh2xml

Microsoft shell

.msi

Microsoft Windows Installer file

.msp

Microsoft Windows Installer update

.mst

Windows SDK setup transform script

.ops

Office system profile settings file

.osd

Open Software Description file

.pcd

Microsoft Visual Test

.pif

Windows program information file

.plg

Microsoft Developer Studio build log

.prf

Windows system file

.prg

Program file

.pst

Exchange Server address book file; Outlook personal folder file

.reg

Registration information/key for Windows 95 and Windows 98; registry data file

.scf

Windows Explorer command

.scr

Windows screen saver

.sct

Windows script component; FoxPro screen

.shb

Windows shortcut into a document

.shs

Shell scrap object file

.ps1

PowerShell

.ps1xml

PowerShell

.ps2

PowerShell

.ps2xml

PowerShell

.psc1

PowerShell

.psc2

PowerShell

.tmp

Temporary file/folder

.url

Internet location

.vb

Microsoft Visual Basic Scripting Edition (VBScript) file; any Visual Basic source

.vbe

VBScript encoded script file

.vbs

VBScript script file; Visual Basic for Applications (VBA) script

.vsmacros

Microsoft Visual Studio .NET binary-based macro project

.vsw

Microsoft Visio workspace file

.ws

Windows script file

.wsc

Windows script component

.wsf

Windows script file

.wsh

Windows script host settings file

.xnk

Exchange Server public folder shortcut

Attachment blocking is an important feature in Outlook 2010 to help prevent viruses from infecting systems. Although you can rely on the default Outlook 2010 attachment security, you can also choose a centrally managed method of customizing attachment handling for Outlook 2010. You can configure attachment blocking in three ways:

Configuring attachment blocking centrally, either via Group Policy or on a computer running Exchange Server, is the most effective and efficient method; it gives you, as an administrator, control over attachment security. It also allows you to tailor security by groups within your Windows domains.

In addition to specifying when Outlook 2010 blocks attachments, you can configure other aspects of Outlook 2010 security via Group Policy (or using the Exchange Security Form), letting you limit the behavior of custom forms and control programmatic access to Outlook 2010.

Attachment blocking in Exchange Server can be configured in two ways:

The settings that are configurable in Group Policy and those set via the Exchange Security Form are largely the same, as described in the following section. Whether you choose to use one or the other, or both, depends on the versions of Exchange Server and Outlook that you need to support. Table 33-2 shows which methods can be used by various email servers.

Clients running Outlook 2010 can use any of these methods, depending on the Outlook Security Mode set in Group Policy. When you use only Group Policy settings, clients running Outlook 2003 or earlier use the default security settings. If an Exchange Security Form is also available, clients running Outlook 2003, Outlook 2002, and Outlook 2000 (with the security update) will use it. Table 33-3 describes the specific behavior of each client with each security method.

Outlook Security Mode is set in Group Policy to specify how clients running Outlook 2010 apply security settings. Outlook 2010 can use Group Policy settings, use the Exchange Security Form stored in one of two public folders (Outlook Security Settings or Outlook 10 Security Settings), or use the Outlook 2010 default security settings.

There are three categories of settings you can configure using Group Policy, controlling attachments, forms, and programmatic access to Outlook 2010. These settings are described in the following sections.

Several options are available for customization of attachment handling, including making changes to the blocked attachment lists, specifying when prompts appear, and controlling users’ ability to configure their own attachment management.

There are several options that control the actions that can be taken by scripts and controls in custom forms:

There are two steps involved in configuring Outlook 2010 attachment security using Group Policy. First, you configure the security settings for attachments and custom forms. Once you are satisfied with the configuration, you configure Group Policy as the method that Outlook 2010 uses to obtain security information.

You manage Outlook 2010 attachment security using the Outlook 2010 administrative template (Outlk14.adm) and the Group Policy Editor.

To install the administrative template, first download the templates from www.microsoft.com and save them to a folder on the local computer or to a file share where you can access them. Then, to add the administrative template to Group Policy, follow these steps:

  1. On a server with the Windows Server administrator tools installed, click Start, Run, type gpedit.msc in the Open box, and then press Enter.

  2. In the Group Policy editor, browse to User Configuration/Administrative Templates.

  3. Right-click Administrative Templates, and then select Add/Remove Template.

  4. In the Add/Remove Templates dialog box, click Add.

  5. Browse to the directory where you downloaded the administrative templates. Select outlk14.adm, and then click Open.

  6. In the Add/Remove Templates dialog box, click Close.

To configure the Outlook 2010 attachment security settings, follow these steps:

  1. On a server with the Windows Server administrator tools installed, run Group Policy by clicking Start, Run, typing gpedit.msc, and then pressing Enter.

  2. Browse to User Configuration\Administrative Templates\Classic Administrative Templates (ADM)\Microsoft Outlook 2010\Security\Security Form Settings\Attachment Security.

  3. Configure the settings, using the following list as a guide. The default setting is Not Configured for all items in this policy:

To configure the Custom Form Security settings, follow these steps:

To configure older Outlook settings, follow these steps:

The preceding sections explained how to configure attachment blocking for Exchange Server users. Non–Exchange Server users can also control attachment blocking, although the method for modifying the attachment list is different. So if you use Outlook 2010 in a workgroup or on a stand-alone computer without Exchange Server, you can still control which attachments Outlook 2010 prevents you from opening. You simply have fewer options for controlling and applying security settings.

Although it’s useful to block attachments in general, there will undoubtedly still be the occasional legitimate attachment that ends up getting blocked by Outlook 2010. Fortunately, even though attachments are blocked, you can still access them using a few other approaches. The attachment file type (Level 1 or Level 2) and the other email programs available to you determine the best method for opening the file.

You can configure Outlook 2010 to allow certain Level 1 attachments (essentially removing them from the Level 1 list) by modifying the registry. (See the section Configuring Attachment Blocking Directly in Outlook, on page 825, for instructions.) You might want to do this if you find yourself repeatedly having to deal with the same type of blocked Level 1 attachment. If you are using Exchange Server, your ability to do this may be controlled by the administrator as described in the section Configuring Blocked Attachments, on page 815.

Like other Office system applications, Outlook 2010 allows you to use macros to automate common tasks. Macros have become an increasingly popular infection mechanism for viruses because most inexperienced users don’t expect to have their systems infected by the sort of Office documents they regularly work with. However, Office macros can contain viruses that cause just as much damage as any other virus. Protecting yourself against macro viruses is an important step in safeguarding your system overall.

You can guard against macro viruses by implementing a virus scanner on your computer that checks your documents for macro viruses, by installing an antivirus solution on your email servers or SharePoint farm, or by using both methods. Another line of protection is to control how and when macros are allowed to run. Outlook 2010 provides four security levels for macros that determine which macros can run on the system. To set the level, in Outlook 2010, click File, Options, Trust Center, Trust Center Settings, and finally Macro Settings, and then select one of these levels:

Note

For additional information about configuring macro security and specifying trusted sources, see the section Setting Macro Security, on page 725. To learn how to add a digital signature to your macros so that they don’t generate a security warning, see the section Signing Your Macros to Avoid Security Warnings, on page 727.

Some applications interact with Outlook 2010, most typically using the address book to address and send a message. In most cases, these applications will generate a security warning dialog box. The warning is built into Outlook 2010 to help you identify when unauthorized applications are attempting to access your Outlook 2010 data. For example, a worm that propagates itself by email would likely generate the warning.

The section Configuring Attachments in Exchange Server, on page 817, explained how Exchange Server administrators can use Group Policy to configure security settings for Outlook 2010 users. That section covered how to configure attachment blocking. You can also use Group Policy to configure the behavior of specific types of applications in relation to the security features in Outlook 2010, as well as specify dynamic-link libraries (DLLs) that should be explicitly trusted and allowed to run without generating a security warning.

Just as with the other security settings that can be configured in Exchange Server, you can control programmatic access to Outlook 2010 via either Group Policy or the Exchange Security Form.

To configure the settings that determine how Outlook 2010 security features handle various types of applications, follow these steps:

  1. Run Group Policy, and then go to User Configuration\Administrative Templates\Classic Administrative Templates (ADM)\Microsoft Outlook 2010\Security\Security Form Settings\Programmatic Security.

  2. Configure the Outlook 2010 object model–related settings as desired. Each of these policy items has the same Guard behavior options. Select Prompt User to have Outlook 2010 prompt the user to allow or deny the action. Select Automatically Approve to allow the program to execute the task without prompting the user. Select Automatically Deny to prevent the program from executing the task without prompting the user. Select Prompt User Based On Computer Security to use the following Outlook 2010 security settings:

  3. When you have finished configuring programmatic settings, close Group Policy.

Part of the battle of getting an application past the Outlook 2010 security prompts is in understanding what method it is using to access your Outlook 2010 data. If you’re not sure, you can simply change one setting, test, and if the change doesn’t enable the application to bypass the security prompts, change a different setting. This trial-and-error method isn’t the most direct, but it won’t take much time to test each of the possibilities. Remember that you must refresh Group Policy and then start Outlook 2010 for these changes to be applied.

In addition to (or as an alternative to) configuring security settings to allow various types of applications to bypass the Outlook 2010 security prompts, you can identify specific applications that can bypass the Outlook 2010 security prompts. These applications must be written specifically to use the Outlook 2010 security trust model.

Before an unsigned application (for example, a noncommercial application) can be added to the in, you must generate a hash key value to use when setting Group Policy. The Outlook 2010 Security Hash Generator Tool is available from Microsoft by going to office.microsoft.com/downloads/ and searching for “Outlook 2010 Security Hash Generator Tool.” Once you have downloaded the hash generator, you have to install and register it before using it to create hash keys.

To install the hash generator, follow these steps:

  1. Run the Hash Generator Tool Setup program to start installation. Specify a folder for the extracted files, and then click OK.

  2. Open a command prompt window, and then go to the folder with the extracted files.

  3. Type CreateHash.bat /register, and then press Enter.

To register an add-in, follow these steps:

  1. Open a command prompt window, and then go to the folder with the extracted files.

  2. Type CreateHash.bat <filename>.dll (where <filename> is the name of your file).

  3. When the hash value is displayed, copy and paste it into the value field in Group Policy (or save it in a text file).

To add a trusted application, follow these steps:

As you have seen, Outlook 2010 has several ways to help keep your system more secure, but there are additional steps that you can take to further ensure that you don’t fall victim to viruses or other malicious software.

If you have access to a location where you can upload files, such as a file server or a SharePoint site, upload your files there and send email with a link to the site rather than sending the file as an attachment. This method has advantages beyond avoiding unwanted attachment blocking: Mail files are smaller without large attachments, for example, and multiple people can download a file from a single location. Plus, you don’t duplicate the file for multiple recipients, which adds to your storage requirements.

When it comes to computer security, a little common sense goes a long way. Pay attention to what you do in email. Don’t open unexpected attachments or those from unknown sources.