Chapter 20. Managing Security Issues

IN THIS CHAPTER

  • Protecting against viruses

  • Understanding Outlook's attachment blocking

  • Implementing macro security

  • Using certificates and digital signatures

  • Encrypting and digitally signing messages

Computer security has unfortunately become a very important topic. With the almost universal use of the Internet and email, it's easier than ever for various kinds of malicious software such as viruses to spread. Security issues also include message privacy and verification of people's identities. Because email is the favored means of spreading such malware, Outlook users have to be particularly vigilant. This chapter explains the various tools that Outlook provides to enhance your security.

Protecting Against Viruses

Everyone has heard about viruses, those malicious software elements that infect and harm computer systems. Viruses range from the merely annoying to the truly disastrous, but they all have one thing in common—you do not want them on your system! Because viruses often spread by means of email, Outlook provides you with some defenses against them.

It's important to understand that Outlook itself does not have any anti-virus capabilities. An anti-virus program is specialized to detect and remove viruses and will have a way to automatically download the latest virus definitions so it can stay up to date. Symantec, Zone Alarm, and McAfee are three of the better-known publishers of anti-virus software. Most systems have anti-virus software installed, and part of protecting yourself against viruses that come with email is to make sure your anti-virus program is configured properly. Specifically, you should set the anti-virus program's options so that it always scans incoming email and attachments for viruses before they get to Outlook. It's also advisable to set the program to scan outgoing email and attachments to prevent you from inadvertently spreading a virus that you have been infected with through other means (such as a floppy disk).

On-Demand Email Scan

If you have an Outlook-compatible anti-virus program installed, you will find two virus-related commands on Outlook's Tools menu:

  • Scan for Viruses: Opens your anti-virus program and performs an immediate virus scan of email items according to the program options. Use this command when you are not sure that the anti-virus program's automatic scanning is enough.

  • Email Scan Properties: Opens your anti-virus program's Options dialog box where you can specify the details of how the program scans email items for viruses.

The details of how the virus scan works and how you set options will depend on the specific anti-virus program that you have installed. Please refer to that program's documentation for more information.

Dealing with Attachments

One of the most common ways for viruses to spread is by means of email attachments. However, all attachments are not equal in their ability to spread a virus. Certain file types are potentially very dangerous, such as executable programs, batch files, and installation files. Others, such as image and music files, are generally safe.

Automatically Blocked Attachments

Because of the potential danger posed by some file types, Outlook blocks certain kinds of attachments sent to you—you receive the message with a notification that an unsafe attachment has been blocked. This blocking is built in to Outlook and cannot be turned off or changed. The blocked file types are listed in Table 20.1.

Outlook also catches these file types on the way out—that is, if you try to send them as an attachment. They aren't necessarily blocked, but Outlook reminds you that the recipient—particularly if they too use Outlook—will not be able to receive them and asks you if you want to proceed.

Table 20.1. File Types Blocked by Outlook

Extension

File Type

.ADE

Access Project Extension (Microsoft)

.ADP

Access project (Microsoft)

.APP

Executable application

.ASP

Active Server Page

.BAS

BASIC source code

.BAT

Batch processing

.CER

Internet Security Certificate file

.CHM

Compiled HTML help

.CMD

DOS CP/M command file, or a command file for Windows NT

.COM

Command

.CPL

Windows Control Panel Extension (Microsoft)

.CRT

Certificate file

.CSH

csh script

.DER

DER encoded X509 certificate file

.EXE

Executable file

.FXP

FoxPro compiled source (Microsoft)

.HLP

Windows Help file

.HTA

Hypertext application

.INF

Information or Setup file

.INS

IIS Internet Communications settings (Microsoft)

.ISP

IIS Internet Service Provider settings (Microsoft)

.ITS

Internet Document Set, Internet Translation

.JS

JavaScript source code

.JSE

JScript encoded script file

.KSH

UNIX shell script

.LNK

Windows Shortcut file

.MAD

Access Module shortcut (Microsoft)

.MAF

Access (Microsoft)

.MAG

Access diagram shortcut (Microsoft)

.MAM

Access macro shortcut (Microsoft)

.MAQ

Access query shortcut (Microsoft)

.MAR

Access report shortcut (Microsoft)

.MAS

Access Stored Procedures (Microsoft)

.MAT

Access table shortcut (Microsoft)

.MAU

Media Attachment Unit

.MAV

Access view shortcut (Microsoft)

.MAW

Access Data Access Page (Microsoft)

.MDA

Access Add-in (Microsoft), MDA Access 2 Workgroup (Microsoft)

.MDB

Access Application (Microsoft), MDB Access Database (Microsoft)

.MDE

Access MDE database file (Microsoft)

.MDT

Access Add-in Data (Microsoft)

.MDW

Access Workgroup Information (Microsoft)

.MDZ

Access Wizard Template (Microsoft)

.MSC

Microsoft Management Console Snap-in control file (Microsoft)

.MSH

Microsoft Shell

.MSH1

Microsoft Shell

.MSH2

Microsoft Shell

.MSHXML

Microsoft Shell

.MSH1XML

Microsoft Shell

.MSH2XML

Microsoft Shell

.MSI

Windows Installer File (Microsoft)

.MSP

Windows Installer Update

.MST

Windows SDK Setup Transform Script

.OPS

Office Profile settings file

.PCD

Visual Test (Microsoft)

.PIF

Windows Program Information file (Microsoft)

.PLG

Developer Studio Build Log

.PRF

Windows System file

.PRG

Program file

.PST

Exchange Address Book file, Outlook Personal Folder File (Microsoft)

.REG

Registration Information/Key for Registry Data File

.SCF

Windows Explorer command

.SCR

Windows screen saver

.SCT

Windows Script component, FoxPro screen (Microsoft)

.SHB

Windows Shortcut into a document

.SHS

Shell Scrap Object file

.TMP

Temporary file/folder

.URL

Internet location

.VB

VBScript file or any VisualBasic source

.VBE

VBScript encoded script file

.VBS

VBScript script file, Visual Basic for Applications script

.VSMACROS

Visual Studio .NET binary-based macro project (Microsoft)

.VSW

Visio workspace file (Microsoft)

.WS

Windows script file

.WSC

Windows script component

.WSF

Windows script file

.WSH

Windows Script Host settings file

Other Attachment Types

Some other file types are not on the blocked list even though they have the potential to carry viruses. The reason these file types are not blocked is because they are very commonly sent as attachments. They include Microsoft Word documents (*.DOC), Excel workbooks (*.XLS), and PowerPoint files (*.PPT). When you receive this kind of file as an attachment, it's important for you to be aware of the potential for harm. Even if you have anti-virus software, you cannot be sure it will catch every virus, particularly because new ones are being created regularly.

The general rule of thumb is to not open any such file unless you trust the source. It is also wise to have macro security set to a safe level, as described elsewhere in this chapter.

Sending Blocked File Types

Many people have perfectly legitimate reasons for sending blocked file types as attachments. There are two ways you can get around Outlook's restrictions to do this:

  • Change the file's extension. For example, if you want to forward a compiled HTML help file named MyHelp.CHM, change the file extension to something that Outlook will not block, such as MyHelp.TXT. In your message, instruct the file recipient to change the file extension back before using the file.

  • Put the file in a ZIP or other kind of archive. This kind of file is permitted by Outlook. You need to instruct the recipient as to how the file can be extracted, of course.

Macro Security

A macro is a sequence of program commands that have been recorded and saved and can be executed with a single command. Outlook has its own macro capabilities, as is covered in Chapter 22. More germane to the topic of security, however, are the macros in programs such as Microsoft Word and Excel. Such macros are part of the document file and as such will be included when the file is sent as an email attachment. A malicious macro can be set to execute automatically when the file is opened, and has the potential to wreak havoc on your system and data files. Such viruses are called macro viruses.

Anti-virus programs catch most macro viruses, and the precaution of not opening attachments from unknown sources is another layer of protection. The final layer of protection against macro viruses is the macro security level in your programs.

Macro security applies to all Office programs, and it is set in the Trust Center. The Trust Center is an Office component, not specifically part of Outlook or any other any program. On Outlook, you access the Trust Center by selecting Trust Center from the Tools menu. Then, in the list on the left, click Macro Security. The Macro Security screen is shown in Figure 20.1.

Setting macro security in the Trust Center.

Figure 20.1. Setting macro security in the Trust Center.

You can see that the options mention signed macros. Digital signing is a way that the person who creates a macro can "sign" it so the recipient can be assured that it comes from a trusted source. You learn more about digital signatures later in this chapter. You can choose from four levels of macro security, described here from the strictest to the least strict:

  • No Warnings and Disable All Macros: No macros, whether signed or not, are ever run.

  • Warnings for Signed Macros; Unsigned Macros Are Disabled: For a signed macro, the program displays a warning and asks you if it should be run. Unsigned macros are never run. This is the default macro security level.

  • Warnings for All Macros: The program displays a warning for any macro, signed or unsigned, and asks you if it should be run.

  • No Security Check for Macros: All macros are run without a warning. For reasons probably obvious, this level is not recommended.

It is recommended to maintain the default level of macro security for all Office programs. You can always set a lower level temporarily if you want to run some unsigned macros from a trusted source.

Using Certificates and Digital Signatures

A certificate, also known as a digital ID, provides a higher level of security with Outlook. You can use a certificate to send encrypted emails so that only the intended recipient can view the contents. You can also use them to sign messages to prevent tampering and prove your identity. Finally, you can use a digital ID in lieu of a username and password to access certain restricted web sites, although this use is not relevant to Outlook.

Digital IDs are based on the technique of a public/private key pair. These are two long numbers related to each other. You can use either key of the pair to encrypt data, and only people who have the other key of the pair are able to unencrypt the data. When you have a digital signature, you keep your private key secret and make your public key freely available. Then, here's how it works:

  • To send an encrypted message to someone, you use their public key to encrypt it. Only they can unencrypt the message because no one else has their private key.

  • To prove your identity, encrypt some data using your private key. When the recipient of a message decrypts the data using your public key, if the data is intact they will know you must have encrypted it because nobody else has your private key.

Digital certificates have expiration dates, typically one year after they are issued.

Obtaining a Digital ID

If you are using Outlook at work, your employer may provide a digital ID to you which you'll import as described in the next section. Otherwise, you can get your own. Digital IDs are provided by independent companies for a small fee. A digital ID is linked to a specific email address and cannot be used with other addresses.

To get your own digital ID:

  1. Select Trust Center from the Tools menu to open the Trust Center.

  2. Click Email Security in the list on the left to display the E-mail Security page (see Figure 20.2).

  3. Click the Get a Digital ID button. Your web browser opens and displays a Microsoft page listing companies selling digital IDs.

  4. Select the company you want and follow the prompts to register for and pay for your digital ID.

Using the Trust Center to get a digital ID.

Figure 20.2. Using the Trust Center to get a digital ID.

After you complete the ordering process, the issuing company will send you an email containing instructions for installing the digital ID.

Importing/Exporting Digital IDs

Digital IDs can be provided to you in a file as well as obtained over the Web as described in the previous section. Your employer may provide you with an ID in a file, and you can also export an existing ID to a file for backup purposes. These files are password-protected for security reasons.

To import a digital ID:

  1. Select Trust Center from the Tools menu to open the Trust Center.

  2. Select E-mail Security from the list on the left.

  3. Under Digital IDs, click the Import/Export button to display the Import/Export Digital ID dialog box (see Figure 20.3).

  4. Select the Import Existing Digital ID option.

  5. Enter the name of the file in the Import File box, or use the Browse button to locate it. Digital ID files have the .EPF, PFX, or .P12 extension.

  6. Enter the file password in the Password box.

  7. Enter a name of your choosing for the certificate in the Digital ID Name box.

  8. Click OK.

The Import/Export Digital ID dialog box.

Figure 20.3. The Import/Export Digital ID dialog box.

Exporting a digital ID uses the same dialog box except that you must select the Export option. Then:

  1. If you have more than one digital ID, use the Select button to choose the ID to export.

  2. Enter the export filename in the Filename box, or use the Browse button to select an export location.

  3. Enter and confirm the password in the boxes provided.

  4. Select the Microsoft Internet Explorer 4.0 Compatible option only if you will use the exported ID with older versions of Internet Explorer.

  5. Select Delete Digital ID from System if you want to completely delete the ID rather than export it.

  6. Click OK.

Receiving Digitally Signed Messages

When you receive a digitally signed message, the only difference is that the message says "Signed By XXXX" (where XXXX is the sender's email address) in the header, just below the subject line. You can use such a message to add the sender's public key to your Contacts list, as explained in the next section.

Just because a message is signed does not mean that the signature is legitimate. On the same line as the "Signed By XXXX" is displayed, Outlook displays a red ribbon icon as shown in Figure 20.4 to indicate the signature is valid. If the signature is not valid, the message "There are problems with the signature" is displayed, and you can click a button to view the details. A digital signature could be invalid because it has expired, the issuing authority has revoked it, or the server that verifies the certificate is invalid.

This icon indicates that the digital signature in a message is valid.

Figure 20.4. This icon indicates that the digital signature in a message is valid.

Obtaining Other People's Public Keys

To send an encrypted message to someone, you must have their public key. You can get this from a signed message the person sent you. Their certificate is added to their entry in Contacts, and is available for you to use to send encrypted email:

  1. Open the digitally signed message.

  2. Right-click the sender's name or address in the From box.

  3. Select Add to Outlook Contacts from the context menu.

  4. If the contact already exists in your Contacts folder, Outlook will notify you. Select Update Information of Selected Contact.

You can view a contact's certificates by opening the contact and clicking the Certificates button in the Show section of the ribbon. Outlook displays a list of the contact's certificates, if there are any, as shown in Figure 20.5. You can take the following actions by clicking the buttons at the right side of this window:

  • Properties: View the certificate details, including the name of the issuing company and its expiration date.

  • Set as Default: If the contact has more than one certificate, this command sets the one that will be used as the default for encrypting messages to the contact.

  • Import: This option lets you import a person's certificate from a file. Certificate files have the .P7C or .CER extension.

  • Export: This option lets you export the certificate to a file. This can be useful when you want to transfer a contact's certificate to another computer.

  • Remove: This option deletes the certificate from the contact information.

Encrypting and Digitally Signing Messages

It's important to understand that encrypting a message and signing a message are two different things:

  • Encrypting uses the recipient's public key to encrypt the message and attachments so that only the recipient can read them.

  • Signing uses your digital ID to mark a message so that recipients can verify that it really came from you.

A message can be signed, encrypted, or both.

Viewing a contact's digital certificates.

Figure 20.5. Viewing a contact's digital certificates.

Encrypting Messages

You can send an encrypted message to anyone for whom you have the public key—in other words, you have their certificate as part of their contact information. You can encrypt single messages or specify that all messages be encrypted (when possible).

To encrypt a single message:

  1. Create the new message.

  2. Click the arrow in the Options section of the Message ribbon to display the Message Options dialog box.

  3. Click the Security Settings button to open the Security Properties dialog box (see Figure 20.6).

  4. Select the Encrypt Message Contents and Attachments option.

  5. Click OK, then click Close, to return to the message.

  6. Compose and send the message as usual.

The Security Properties dialog box.

Figure 20.6. The Security Properties dialog box.

Of course, a message can be encrypted only when it is going to one or more recipients for whom you have a certificate. If you request encryption for a message going to people for whom you do not have a certificate, Outlook displays a message and gives you the option of sending the message without encryption.

You can also tell Outlook to encrypt all outgoing messages and attachments. Of course, this affects only messages that you send to people whose public key you have.

  1. Select Trust Center from the Tools menu to open the Trust Center window.

  2. Select E-mail Security from the list on the left.

  3. Select the option Encrypt Contents and Attachments for Outgoing Messages.

Digitally Signing Messages

As with encryption, you can apply digital signatures to individual outgoing messages or to all of them.

To add a digital signature to an individual message:

  1. Create, compose, and address a new email message as usual.

  2. Click the arrow in the Options section of the Message ribbon to display the Message Options dialog box.

  3. Click the Security Settings button to open the Security Properties dialog box (shown earlier in Figure 20.6).

  4. Select the Add Digital Signature to the Message option.

  5. Click OK, then click Close, to return to the message.

To add a digital signature to all outgoing messages:

  1. Select Trust Center from the Tools menu.

  2. Click E-mail Security.

  3. In the Encrypted E-mail section, select the Add Digital Signature to Outgoing Messages option.

  4. Click OK.

HTML Message Dangers

Because HTML messages can contain script and ActiveX controls, they are a potential source of virus attacks. To guard against any HTML viruses that make it past your anti-virus software, you can tell Outlook to display HTML messages as plain text. Because scripts and ActiveX controls are not activated until the HTML is displayed, this prevents them from doing harm.

To guard against malicious HTML messages:

  1. Select Trust Center from the Tools menu.

  2. Click E-mail Security.

  3. Under Read as Plain Text, select the Read All Standard Mail in Plain Text (this means unsigned messages).

  4. If you want to include digitally signed messages, select the Read All Digitally Signed Mail in Plain Text option.

  5. Click OK.

Summary

You ignore email security at your own peril. In today's interconnected world, it is all too easy for viruses and other malicious software to spread. Fortunately, Outlook provides you with a number of tools that help you to protect yourself against these threats.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.94.153