Showing results for 
Search instead for 
Did you mean: 
Level 7

Continously getting "Outlook Envelope - Dangerous File Creation" alert

Dear All,

We are using Mcafee HIPS in all my users systems/desktops in alert mode. But what we noticed that we are getting HIPS alert "Outlook Envelope - Dangerous File Creation" from two desktops continously.

Need to know what does it mean on this alert and whether its ignorable. If no, How to resolve this permanantly.



0 Kudos
2 Replies
McAfee Employee

Re: Continously getting "Outlook Envelope - Dangerous File Creation" alert

Please see:

KB73399 - FAQs for Host Intrusion Prevention 8.0

Client IPS/FAQ - IPS Events

IPS signature events are one of the top call generators for the Host Intrusion Prevention (Host IPS) product. Normally, these inquires are the result of IPS Signature Event triggers. In general, Host IPS offers IPS and firewall protection for endpoint systems as part of a layered protection strategy. This layered protection strategy should include Network gateway firewall/intrusion systems or filtering, endpoint anti-virus, and endpoint anti-malware applications, in addition to Host IPS. 

Host IPS signature content provides security to protect against known system vulnerabilities and unknown (zero-day) vulnerabilities. Zero-day is defined as the gap between unpatched systems and subsequently applying released security updates for confirmed vulnerabilities. Host IPS content contains generic buffer overflow and other generic signature mechanisms to protect systems during this zero-day gap period. However, McAfee recommends that you apply all operating system and application-specific security updates as soon as practical within your environment to reduce frequent or repeated IPS signature detections. 

McAfee advises that you follow a general methodology for reviewing operating system and application-specific security updates, and also patch systems and applications on a monthly or regular basis. McAfee also advises that you review monthly Host IPS signature updates for correlation to specific vendor security updates that are released. Host IPS signatures mapping directly to vendor-available security updates can be safely disabled on updated systems. McAfee recommends that you review enabled signature content and system patching with available security updates monthly to reduce the likelihood of excessive false positives on already updated systems.

Use the following general methodology when assessing IPS signature events:

  1. Identify the signature number that is being triggered.
  2. Review the IPS Signature number description information from the IPS Rules policy in ePolicy Orchestrator (ePO).
  3. Review the References CVE description link(s), if any are included in the description information for that signature.
  4. Identify whether any Microsoft Technet Security Bulletins are linked for the applicable vulnerability, and identify whether any Microsoft security updates have been released that resolve the vulnerability.
  5. Verify whether systems reporting the IPS event have any applicable Microsoft Security Updates applied (as noted above):

    1. If so, the applicable IPS Signature may be disabled on the systems having the associated Microsoft Security Updates applied.
    2. If not, McAfee recommends that you apply the applicable Microsoft Security Updates to the affected systems at your earliest convenience.
  6. If no CVE description links are noted for the triggering IPS signature, review all advanced details for the received IPS event.
  7. Identify whether the event triggers correlate to normal business usage or process.
  8. Identify whether the systems experiencing the event have all of the latest Microsoft Security Updates applied.
  9. Identify whether the IPS event is specific for a third-party process, such as Adobe or other non-Microsoft application, process, or other tool. If so, review all applicable security updates from the vendor and ensure they are applied on the systems.
  10. If the signature is still triggering after an applicable vendor security update has been applied, consider the event a false positive and either disable the signature to the updated systems, or create an IPS exception for the updated systems to stop all further signature detections.
  11. If there is no applicable vendor security update available, determine whether the affected systems have current anti-virus and anti-malware definitions for McAfee VirusScan or other installed endpoint protection application. Perform a full scan on the affected systems.
  12. Determine whether the affected systems are protected by other perimeter security measures, such as Network Intrusion Detection.
  13. Enable verbose debug logging by enabling Log security violations for Host IPS so advanced information can be collected in the HipShield.log. See article KB54473 for relevant information regarding IPS security violations in the HipShield.log.
  14. Contact McAfee support for further analysis.

0 Kudos
Level 7

Re: Continously getting "Outlook Envelope - Dangerous File Creation" alert

Thanks for the update.  I will check whether end user system running with latest security patches and EPO anti virus.



0 Kudos