There are several features of the Attachment Manager that can be configured by using Group Policy or the local registry.
This policy setting lets you manage the default risk level for file types. To fully customize the risk level for file attachments, you may also have to configure the trust logic for file attachments:
- High Risk
If the attachment is in the list of high risk file types and is from the restricted zone, Windows blocks the user from accessing the file. If the file is from the Internet zone, Windows prompts the user before accessing the file.
- Moderate Risk
If the attachment is in the list of Moderate Risk file types, Windows will not prompt the user before accessing the file, regardless of the file's zone information.
- Low Risk
If the attachment is in the list of low risk file types, Windows will not prompt the user before accessing the file, regardless of the file’s zone information.
If you enable this policy setting, you can specify the default risk level for file types. If you disable this policy setting, Windows sets the default risk level to moderate. If you do not configure this policy setting, Windows sets the default risk level to moderate.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_CURRENT_USER\ Software\Microsoft\Windows\CurrentVersion\Policies\Associations |
DefaultFileTypeRisk |
High (6150)
or
Moderate (6151)
or
Low (6152) |
Note The default value of the DefaultFileTypeRisk registry entry is Moderate (6151).
This policy setting lets you manage whether Windows marks file attachments that have information about their zone of origin. These zones or origin are Internet, intranet, and local. This policy setting requires the NTFS file system to function correctly and will fail without notice on systems that use FAT32. By not preserving the zone information, Windows cannot make appropriate risks assessments. If you enable this policy setting, Windows does not mark file attachments by using their zone information. If you disable this policy setting, Windows marks file attachments by using their zone information. If you do not configure this policy setting, Windows marks file attachments by using their zone information.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments |
SaveZoneInformation |
On (1)
or
Off (2) |
Note The default value of the DefaultFileTypeRisk registry entry is Off (2).
Hide mechanisms to remove zone information
This policy setting lets you manage whether users can manually remove the zone information from saved file attachments by clicking
Unblock on the file’s
Properties tab or by clicking to select a check box in the
Security Warning dialog box. Removing the zone information lets users open potentially dangerous file attachments that Windows has blocked users from opening. If you enable this policy setting, Windows hides the check box and the
Unblock button. If you disable this policy setting, Windows shows the check box and the
Unblock button. If you do not configure this policy setting, Windows shows the check box and the
Unblock button.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments |
HideZoneInfoOnProperties |
Off (0)
or
On (1) |
Note The default value of the
DefaultFileTypeRisk registry entry is Off (0).
These policy settings let you configure the list of low, moderate, and high risk file types. The High list takes precedence over the Moderate and Low risk inclusion lists. Also, an extension is listed in more than one inclusion list. If you enable this policy setting you can create a custom list of low, moderate, and high risk file types. If you disable this policy setting, Windows uses its built in list of file types. If you do not configure this policy setting, Windows uses its built in list of file types.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations |
HighRiskFileTypes
ModRiskFileTypes
LowRiskFileTypes |
|
This policy setting lets you configure the logic that Windows uses to determine the risk for file attachments. Preferring the file handler instructs Windows to use the file handler data over the file type data. For example, it instructs Windows to trust Notepad.exe, but do not trust .txt files. Preferring the file type instructs Windows to use the file type data over the file handler data. For example, trust .txt files, regardless of the file handler. Using both the file handler and type data is the most restrictive option. Windows chooses the more restrictive recommendation. This causes users to see more trust prompts than selecting the other options. If you enable this policy setting, you can select the order in which Windows processes risk assessment data. If you disable this policy, Windows uses its default trust logic which prefers the file handler over the file type.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_CURRENT_USER\ Software\Microsoft\Windows\CurrentVersion\Policies\Attachments |
UseTrustedHandlers |
File Type (1)
or
Handler (2)
or
Both (3) |
Note The default value of the
DefaultFileTypeRisk registry entry is Handler (2).
This policy setting lets you manage the behavior for notifying registered antivirus programs. If multiple programs are registered, they will all be notified. If the registered antivirus program already performs on-access checks or scans files as they arrive on the computer’s e-mail server, additional calls would be redundant. If you enable this policy, Windows tells the registered antivirus program to scan the file when a user opens a file attachment. If the antivirus program fails, the attachment is blocked from being opened. If you disable this policy, Windows does not call the registered antivirus programs when file attachments are opened. If you do not configure this policy, Windows does not call the registered antivirus programs when file attachments are opened.
Group Policy |
Registry Subkey |
Registry Entry |
Entry Value |
User Configuration\Administrative Templates\Windows Components\Attachment Manager |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments |
ScanWithAntiVirus |
Off (1)
or Optional (2) or
On (3) |
Note The default value of the DefaultFileTypeRisk registry entry is Off (1). When the value is set to Optional (2), all scanners are called even after one reports a detection.
For more information, click the following article number to view the article in the Microsoft Knowledge Base:
182569 Internet Explorer security zones registry entries for advanced users