{"id":11249,"date":"2025-07-10T16:17:40","date_gmt":"2025-07-10T14:17:40","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/gefaehrliche-dateitypen-warum-konsequentes-blockieren-sinnvoll-sein-kann\/"},"modified":"2025-07-14T09:11:37","modified_gmt":"2025-07-14T07:11:37","slug":"dangerous-file-types-why-consistently-blocking-them-may-be-the-smart-approach","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/dangerous-file-types-why-consistently-blocking-them-may-be-the-smart-approach\/","title":{"rendered":"Dangerous File Types: Why Consistently Blocking Them May Be the Smart Approach"},"content":{"rendered":"\n
In the majority of cyberattacks, email attachments remain the preferred vehicle for malicious contents. Despite facing defense mechanisms, intelligent threat detection and AI-powered analytics, attackers have repeatedly proven their ability to sneak malware into corporate networks \u2013 especially by way of email attachments. In this context, one crucial approach to email security is often underrated \u2013 the basic, preventive blocking of all potentially harmful file formats regardless of threat detection outcomes.<\/p>\n\n\n\n
Attackers make use of legitimate tools or file formats such as Java or PowerShell files as well as office documents containing imbedded macros or password protected archives. Although potentially harmful, from a technical perspective many of these formats initially appear inconspicuous, meaning that they are not always reliably detected by conventional AV engines or even sandboxes. <\/p>\n\n\n\n
A typical example from the real world: In the day-to-day administration of a hospital or medical laboratory, staff don\u2019t usually encounter java files (.jar) or executable scripts (.ps1, .vbs). Bank employees, likewise, generally don\u2019t need to work with compressed, password protected archives (at least not in their email inboxes). Structured formats such as PDF, Excel or XML, which can be analyzed more easily and securely, are more widespread.<\/p>\n\n\n\n
Rather than blocking messages generally, a more nuanced view which takes the specific sector into consideration can help companies to purposefully bolster their security. In many sectors, it is clearly evident which file formats are required in daily business communication \u2013 and which invariably represent a risk. The same approach can be applied to specific sectors or job profiles within a company. In this way, the attack surface can be reduced considerably without compromising on the efficiency of communication or running the risk of filtering out legitimate emails.<\/p>\n\n\n\n
Complementing our already comprehensive advanced threat detection<\/a>and AI-based sandboxing technologies<\/a> with the targeted, systematic blocking of file types adds an extra layer of protection to bolster security substantially within corporate email communications. The Retarus Attachment Blocker<\/strong> allows both inbound and outbound emails to be filtered based on previously defined rules \u2013 for instance, according to file extensions, MIME types or suspect features like password protection.<\/p>\n\n\n\n Thanks to the newly expanded range of configuration options, IT administrators are set to benefit from an even more powerful tool. Nuanced filtering rules and sophisticated notification functions now enable the service to be adapted with more ease and precision to meet the specific requirements at your company. Look out for more on this topic in the near future.<\/p>\n","protected":false},"excerpt":{"rendered":" Complementing our already comprehensive advanced threat detection and AI-based sandboxing technologies with the targeted, systematic blocking of file types adds an extra layer of protection to bolster security substantially within corporate email communications. The Retarus Attachment Blocker allows both inbound and outbound emails to be filtered based on previously defined rules \u2013 for instance, according to file extensions, MIME types or suspect features like password protection.<\/p>\n","protected":false},"author":12,"featured_media":11250,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[9],"tags":[102],"class_list":["post-11249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-news","tag-email-security"],"acf":[],"yoast_head":"\n