2 Replies Latest reply on May 29, 2015 10:54 AM by eplossl

    Email Gateway Block based in uncompressed file

    layer0

      Hello

       

      I have the following question, is it possible to block a email based on a file inside a compressed file (zip, rar) attached to the email? how?

       

      for example the email has attached the file "compressedfile.zip" and inside this zip there is a file called "virus#"$"#$#".exe" can i block based on the uncompressed file for example with a regular expression (virus*.exe)? or other method.

       

      Thanks

        • 1. Re: Email Gateway Block based in uncompressed file
          garcia.robert

          The MEG's scans the contents of compress files automatically, to block emails with .exe you would want to sent up a file filtering rule under compliance.

           

          -Find File Filtering under compliance

          -Click add rule, Create name

          -Check Enable File Category Filtering

          -Under Category Filtering choose Windows Executable and make sure Other Specific Windows Executables is checked.

          -Click ok

          -Under If Trigger pick your action

          -Then save. 

           

          That's a pretty basic way of blocking or quarantining .exe

          • 2. Re: Email Gateway Block based in uncompressed file
            eplossl

            The one catch to this answer is that if you have a rule which explicitly allows ZIPs through, you need to check the box for that rule which tells the MEG to continue scanning.  If you do not, the MEG will encounter the zip, decide that it's allowed, and then not scan any further to see if there's anything that's not allowed.