Microsoft OneNote Security Blocks 120 File Extensions to Tighten Security
To larger defend customers, Microsoft has published detailed data on the harmful embedded files that OneNote will quickly block.
“To abet defend you and your recipients in opposition to computer viruses, Outlook blocks the sending and receiving of definite kinds of files (akin to .exe and definite database files) as attachments,” Microsoft.
Threat actors embed unhealthy files and scripts in malicious Microsoft OneNote paperwork, preserving them with fabricate aspects.
Following recent and ongoing phishing attacks propagating malware, Microsoft at the starting up disclosed that OneNote will beget improved security in a Microsoft 365 roadmap article launched nowadays last month.
As Microsoft patched a MoTW, bypassed zero-day exploit to unfold malware by strategy of ISO and ZIP files, and lastly disabled Discover and Excel macros by default, threat actors began the exercise of OneNote paperwork in spear phishing campaigns round the guts of December 2022.
Blocked File Forms in Outlook
In response to Microsoft, the files idea to be unhealthy and blocked in OneNote will be aligned with those blocked in Outlook, Discover, Excel, and PowerPoint.
.ade, .adp, .app, .software, .appref-ms, .asp, .aspx, .asx, .bas, .bat, .bgi, .cab, .cer, .chm, .cmd, .cnt, .com, .cpl, .crt, .csh, .der, .diagcab, .exe, .fxp, .gadget, .grp, .hlp, .hpj, .hta, .htc, .inf, .ins, .iso, .isp, .its, .jar, .jnlp, .js, .jse, .ksh, .lnk, .exasperated, .maf, .magazine, .mam, .maq, .mar, .mas, .mat, .mau, .mav, .maw, .mcf, .mda, .mdb, .mde, .mdt, .mdw, .mdz, .msc, .msh, .msh1, .msh2, .mshxml, .msh1xml, .msh2xml, .msi, .msp, .mst, .msu, .ops, .osd, .pcd, .pif, .pl, .plg, .prf, .prg, .printerexport, .ps1, .ps1xml, .ps2, .ps2xml, .psc1, .psc2, .psd1, .psdm1, .pst, .py, .pyc, .pyo, .pyw, .pyz, .pyzw, .reg, .scf, .scr, .sct, .shb, .shs, .theme, .tmp, .url, .vb, .vbe, .vbp, .vbs, .vhd, .vhdx, .vsmacros, .vsw, .webpnp, .web region, .ws, .wsc, .wsf, .wsh, .xbap, .xll, .xnk
Users will no longer beget the option to access files with sinful extensions after the safety improve goes dwell. Sooner than, OneNote told customers that accepting attachments would possibly per chance perhaps damage their data whereas permitting them to starting up out the embedded files marked as unsafe.
When a file is limited, customers will note a notification that reads, “Your administrator has blocked your ability to starting up out this file form in OneNote.”
In response to Microsoft, between dead April and dead Can also 2023, OneNote for Microsoft 365 on Home windows devices will originate to come by the modification in Model 2304 in Contemporary Channel (Preview).
The security enhancement have to no longer integrated in volume-licensed variations of Office, akin to Office Fashioned 2019 or Office LTSC Skilled Plus 2021; this will seemingly be accessible in retail variations of Office 2021, Office 2019, and Office 2016 (Contemporary Channel).
Nonetheless, this have to no longer accessible in OneNote on the on-line, OneNote for Home windows 10, OneNote for Mac, or OneNote for Android or iOS devices.
Replace channel | Model | Launch date |
Contemporary Channel (Preview) | Model 2304 | First half of April 2023 |
Contemporary Channel | Model 2304 | 2nd half of April 2023 |
Monthly Enterprise Channel | Model 2304 | June 13, 2023 |
Semi-Annual Enterprise Channel (Preview) | Model 2308 | September 12, 2023 |
Semi-Annual Enterprise Channel | Model 2308 | January 9, 2024 |
To dam further file extensions you would defend in thoughts unsafe, spark off the ‘Block further file extensions for OLE embedding’ policy below Shopper ConfigurationInsurance policiesAdministrative TemplatesMicrosoft Office 2016Security Settings and decide out the extensions it’s essential to deserve to be blocked.
Moreover, you would spark off the “Enable file extensions for OLE embedding” policy from the equal residence in the Neighborhood Policy Administration Console and specify which extensions it’s essential to deserve to permit in the occasion you beget to permit particular file extensions that can presently be blocked by default.
Moreover, you would adjust the insurance policies to test your needs the exercise of the Cloud Policy provider for Microsoft 365. Any modification you score will additionally impact Discover, Excel, and PowerPoint.
These insurance policies aren’t accessible in Microsoft Apps for Industry; subsequently they’re only accessible to customers of Microsoft 365 Apps for Enterprise.
Linked Read:
- Microsoft Introduces Contemporary GPT-4 Tool to The Cybersecurity Battlefield
- CISA Released a Contemporary Tool to Detect Hacking Exercise in Microsoft Cloud Environments
- Microsoft Groups, Virtualbox, Tesla Zero-Days Exploited – Pwn2Own Day Two
- Hackers Exploiting Microsoft Outlook Privilege Escalation Flaw in The Wild
Source credit : cybersecuritynews.com