Spam Filtering

Attachment Policy's Attachments Policy
*Spam Filter Service News for June 11, 2015

Peer-to-Peer LLC ( protects against malware which often propagates from executable attachments.  In order to combat against email malware attacks, removes all scripts and executable file attachments, even if the executable file is hidden inside of a ZIP file.

If an executable file attachment is detected, the attachment will be removed but the message will be allowed to pass thru to the end user.


In order to receive an executable attachment, the sender must rename the file extension.
(For example:  Rename from 'test.exe' to '')
After you receive the file, simply rename the file from '' to 'test.exe'


End User Awareness
This policy will force the end user (recipient) to make a very conscious decision as to the legitimacy of their actions before opening an attachment.  First, the end user will need to contact the sender and have them rename the file and second, the end user will need to rename the file once received in order to make the file executable.

If the end user still opens an infected file after these steps, we recommend you lock them out of the building ;)


We block the following types of executable file attachments:

  • .ade
  • .adp
  • .bat
  • .chm
  • .cmd
  • .com
  • .cpl
  • .docm
  • .dotm
  • .exe
  • .hta
  • .ins
  • .isp
  • .js
  • .jse
  • .lib
  • .lnk
  • .mde
  • .msc
  • .msp
  • .mst
  • .pif
  • .potm
  • .ppsm
  • .pptm
  • .scr
  • .sct
  • .shb
  • .sldm
  • .sys
  • .vb
  • .vbe
  • .vbs
  • .vxd
  • .wsc
  • .wsf
  • .wsh
  • .xlsb
  • .xlsm
  • .xltm
  • .xla
  • .xlam

RSS Link Subscribe to Spam News Subscribe