{"id":625,"date":"2008-05-15T13:00:42","date_gmt":"2008-05-15T11:00:42","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/"},"modified":"2008-05-15T13:00:42","modified_gmt":"2008-05-15T11:00:42","slug":"outlook-and-owa-tips-tricks","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/","title":{"rendered":"Outlook and OWA Tips &amp; Tricks"},"content":{"rendered":"<div class=\"ExternalClass99D9E322068643B18783390AA714DDD4\">\n<h4>1. Manage Attachment behaviour<\/h4>\n<h5>1.1. Outlook 2007<\/h5>\n<p>Although you probably have deployed an antivirus solution in your messaging infrastructure, by default, Outlook blocks access to certain attachments, even if they have been scanned or not. After all, Outlook doesn't really know if an attachment has been scanned and is safe for you to open. <\/p>\n<p>The list of attachments that are being blocked out of the box can be found at http:\/\/office.microsoft.com\/en-us\/outlook\/HP030850041033.aspx <\/p>\n<p>There may be valid reasons why certain attachments should not be blocked, so if you want to allow attachment extensions from the list of Level1 attachments (see URL above), this is how you should do it : <\/p>\n<ol>\n<li>Close Outlook <\/li>\n<li>Edit registry <\/li>\n<li>Locate the key that corresponds with your Outlook version        <br \/>Outlook 2000 [HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\9.0\\Outlook\\Security]         <br \/>Outlook 2002 [HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\10.0\\Outlook\\Security]         <br \/>Outlook 2003 [HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\11.0\\Outlook\\Security]         <br \/>Outlook 2007 [HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\12.0\\Outlook\\Security] <\/li>\n<li>Create a new REG_SZ value (String) and name the value Level1Remove        <br \/>Edit the newly created value and enter the extension including the &#8220;dot&#8221; that you want to allow in Outlook. For instance .crt         <br \/>If you need to enter more than one extension you&#8217;ll have to type separate them by a semicolon like this; .crt;.url         <br \/>Make sure the syntax is correct, otherwise the changes won't have any effect. <\/li>\n<li>Save the changes <\/li>\n<li>Open Outlook and verify that these attachments now work        <\/li>\n<\/ol>\n<p>Note : you can also change the attachment behaviour by using OutlookTools from <a href=\"https:\/\/web.archive.org\/web\/20210126044028\/https:\/\/www.howto-outlook.com\/products\/outlooktools.htm\">http:\/\/www.howto-outlook.com\/products\/outlooktools.htm<\/a><\/p>\n<p>If you want to undo these customizations, simply remove them from the registry again and you should be all set. <\/p>\n<p>You can use a GPO as well to deploy these customizations for all of your Outlook clients at once. For Outlook 2007, this is how this works : <\/p>\n<p>Download the Outlook adm file from <a title=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=92d8519a-e143-4aee-8f7a-e4bbaeba13e7&amp;displaylang=en\" href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=92d8519a-e143-4aee-8f7a-e4bbaeba13e7&amp;displaylang=en\">http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=92d8519a-e143-4aee-8f7a-e4bbaeba13e7&amp;displaylang=en<\/a> <\/p>\n<p>Run the AdminTemplates.exe file, which will extract the necessary files to the location specified by you. <\/p>\n<p>Open this folder and look for the ADM folder. <\/p>\n<p>Open the ADM folder, select your language, and look for a file called outlk12.adm <\/p>\n<p>Open your GPO editor. Since the attachment settings will apply to users, you will need to edit user settings and apply the outlook customizations to users. Create a GPO that targets your users. <\/p>\n<p>Edit the GPO, open &quot;User Configuration&quot;, right-click &quot;Administrative Templates&quot; and select &quot;Add\/Remove Templates&quot; <\/p>\n<p>Click Add, browse to the outlk12.adm file and click Open.<\/p>\n<p>Verify that the file is in the list and click Close<\/p>\n<p>&#160;<\/p>\n<p>Wait until the new Outlook settings are loaded into the GPO editor. Next, under Administrative Templates, open &quot;Microsoft Office Outlook 2007&quot; - &quot;Security&quot; - &quot;Security Form Settings&quot; - &quot;Attachment Security&quot;<\/p>\n<p>Edit the &quot;Remove file extensions blocked at level1&quot; and set the GPO setting to &quot;Enabled&quot;      <br \/>Add the list of extensions that should be allowed (separated with \ud83d\ude09 and click &quot;OK&quot; to save. Don't use a &lt;dot&gt; in this list !       <br \/>&#160; <\/p>\n<p>You can find more information on this topic on Technet : <a title=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc178961.aspx\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc178961.aspx\">http:\/\/technet.microsoft.com\/en-us\/library\/cc178961.aspx<\/a> <\/p>\n<p>If the GPO is applied correctly, you can find the modified registry settings under HKCU\\Software\\Policies\\Microsoft\\Office\\&lt;your version&gt;\\Outlook <\/p>\n<p>&#160; <\/p>\n<p>Last but not least, if you want to prohibit your end-users to make customizations themselves, in an attempt to bypass your security policies, then you need to create a registry key value (look for the key that corresponds with your Outlook version - see table above) <\/p>\n<p>HKCU\\Software\\Policies\\Microsoft\\Office\\&lt;your version&gt;\\Outlook      <br \/>Value name: DisallowAttachmentCustomization <\/p>\n<p>Change the security on this value, so the local users cannot change this key. Alternatively, you can deploy this setting via GPO as well :&#160; &quot;Administrative Templates&quot;&#160; - &quot;Microsoft Office Outlook 2007&quot; - &quot;Security&quot; : Set &quot;Prevent Users from customizing attachment security settings&quot; to Enabled.      <br \/>&#160;<\/p>\n<p>&#160;<\/p>\n<h5>1.2. Outlook Web Access<\/h5>\n<p>Exchange 2007 based Outlook Web Access manages access to attachments in 2 layers. First of all, you'll notice different behaviour when you log on to OWA and use the private vs&#160; public computer profile.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-21.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"186\" alt=\"image_2\" src=\"\/wp-content\/uploads\/2008\/09\/image-2-thumb1.png\" width=\"406\" \/><\/a> <\/p>\n<p>If you log on with a public profile, you'll see that OWA has blocked all access to attachments.&#160; If you log on with a private computer profile, you'll have access to some attachments (except for the Level1 attachments)<\/p>\n<p>The second layer addresses these Level1 attachments. You can change the behaviour of the OWA web engine by changing the registry on the server that is hosting the OWA website.&#160; In MS Exchange 2003, you could do this by editing the registry, navigate to <b>HKLM\\System\\CurrentControlSet\\Services\\MSExchangeWeb\\OWA\\        <br \/><\/b>Create a REG_SZ (string) called Level1FileTypes and add the file types that you want to allow, using the same syntax as explained in chapter 1.1 (for Outlook clients)<\/p>\n<p>Under MS Exchange 2007, access to Attachments in fully manageable via the Exchange Management Console.<\/p>\n<p>Open EMS, go to &quot;Server Configuration&quot;, click &quot;Client Access&quot;, select the OWA server in the lower pane, right click and choose properties.<\/p>\n<p>You can modify the behaviour for both the Public Computer and the Private Computer profile<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-43.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"205\" alt=\"image_4\" src=\"\/wp-content\/uploads\/2008\/09\/image-4-thumb2.png\" width=\"369\" \/><\/a> <\/p>\n<p>Under &quot;Private Computer File Access&quot;, in the &quot;Direct File Access&quot; section, click &quot;Customize&quot;.<\/p>\n<p>This is where you can change the behaviour of the attachment handling for OWA<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-63.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"319\" alt=\"image_6\" src=\"\/wp-content\/uploads\/2008\/09\/image-6-thumb3.png\" width=\"328\" \/><\/a> <\/p>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>2. Speed up Outlook Web Access<\/h4>\n<p>Open Exchange Management Shell (Powershell) and execute the following commands :<\/p>\n<p><font face=\"Courier New\">[PS] C:\\&gt;<strong>set-OwaVirtualDirectory -identity &quot;Owa (Default Web Site)&quot; -gziplevel high<\/strong>         <br \/>WARNING: For these configuration changes to take effect, you must restart Internet Information Services (IIS). To restart IIS, run the following command: &quot;iisreset \/noforce&quot;.         <br \/>[PS] C:\\&gt;<strong>iisreset \/noforce<\/strong> <\/font><\/p>\n<p><font face=\"Courier New\">Attempting stop...        <br \/>Internet services successfully stopped         <br \/>Attempting start...         <br \/>Internet services successfully restarted         <br \/>[PS] C:\\&gt;<\/font><\/p>\n<p>Because setting the gziplevel to high will put additional load to the CPU of the OWA server, make sure to verify that you are not choking the server to death.<\/p>\n<p>&#160;<\/p>\n<h4>3. Outlook Web Access Forms Authentication : Custom logo\/Branding<\/h4>\n<p>You can use the following procedure to change the layout of the OWA 2007 Forms Authentication page, and include your own logo.&#160; You will have to make the modifications to every OWA server separately.&#160; You can find the procedure how to create custom themes at http:\/\/msexchangeteam.com\/archive\/2006\/08\/30\/428793.aspx<\/p>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>4. Outlook Dumpster : recover deleted items that have been removed from &quot;Deleted Items&quot;<\/h4>\n<p>This feature can be managed on 2 fronts :<\/p>\n<p>First of all, you need to enable this feature in the Outlook client.&#160; Edit the registry and create a new DWORD value under HKLM\\Software\\Microsoft\\Exchange\\Client\\Options<\/p>\n<p>Value : DumpsterAlwaysOn<\/p>\n<p>Edit the value and set this parameter to 1<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-83.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"152\" alt=\"image_8\" src=\"\/wp-content\/uploads\/2008\/09\/image-8-thumb2.png\" width=\"247\" \/><\/a> <\/p>\n<p>This will enable the Dumpster on the client.<\/p>\n<p>Open Outlook, go to &quot;Tools&quot;. You should find a menu item called &quot;Recover Deleted Items&quot;<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-103.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"246\" alt=\"image_10\" src=\"\/wp-content\/uploads\/2008\/09\/image-10-thumb3.png\" width=\"173\" \/><\/a> <\/p>\n<p>&#160;<\/p>\n<p>The second setting needs to be configured on the Exchange server.&#160; <\/p>\n<p>First of all, make sure that, if you have defined a Managed Default Folder policy, that it allows for recovery in the first place.<\/p>\n<p>Open the Exchange Management Console.&#160; Open &quot;Organization Configuration&quot; - &quot;Mailbox&quot;<\/p>\n<p>Open the &quot;Managed Default Folders&quot; tabsheet.&#160; Locate &quot;Deleted Items&quot; and see if there is a Managed Content Policy tied to the folder.<\/p>\n<p>If so, verify that the policy allows for recovery<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-123.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"188\" alt=\"image_12\" src=\"\/wp-content\/uploads\/2008\/09\/image-12-thumb3.png\" width=\"313\" \/><\/a> <\/p>\n<p>Finally, define how long you want deleted items to be recoverable by end users. This setting is defined on the mailbox store.<\/p>\n<p>In the Exchange Management Console, go to &quot;Server Configuration&quot; - &quot;Mailbox&quot;. Select the Mailserver, then select the Mailbox database in the lower part of the window and edit the properties.<\/p>\n<p>In the &quot;Limits&quot; tabsheet, you can define the number of days deleted items should be kept available for recovery :<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-143.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"264\" alt=\"image_14\" src=\"\/wp-content\/uploads\/2008\/09\/image-14-thumb3.png\" width=\"321\" \/><\/a> <\/p>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>5. AutoComplete for Email Addresses<\/h4>\n<p>I'm sure you have noticed that Outlook keeps track of email addresses that have been entered in the address fields. These addresses are stored in a cache file in your profile folder, called &lt;yourprofile&gt;.nk2 (where &lt;yourprofile&gt; is in fact the Outlook profile name). By default, the file is saved under AppData\\Roaming\\Microsoft\\Outlook      <br \/>So if your profile is called &quot;Outlook&quot;, the file is called Outlook.NK2 :&#160; <br \/><a href=\"\/wp-content\/uploads\/2008\/09\/image-163.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"130\" alt=\"image_16\" src=\"\/wp-content\/uploads\/2008\/09\/image-16-thumb3.png\" width=\"361\" \/><\/a> <\/p>\n<p>You can enable or disable this behaviour using the following procedure :<\/p>\n<p>Click &quot;Tools&quot; - &quot;Options&quot;. Go to the Preferences tab and click &quot;E-mail options&quot; in the E-mail section&#160; <br \/><a href=\"\/wp-content\/uploads\/2008\/09\/image-183.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"121\" alt=\"image_18\" src=\"\/wp-content\/uploads\/2008\/09\/image-18-thumb3.png\" width=\"335\" \/><\/a> <\/p>\n<p>Next, click &quot;Advanced E-mail options&quot;<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-202.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"188\" alt=\"image_20\" src=\"\/wp-content\/uploads\/2008\/09\/image-20-thumb2.png\" width=\"353\" \/><\/a> <\/p>\n<p>To enable this feature (it is enabled by default), select &quot;Suggest names while completing...&quot;<\/p>\n<p>&#160;<a href=\"\/wp-content\/uploads\/2008\/09\/image-222.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"70\" alt=\"image_22\" src=\"\/wp-content\/uploads\/2008\/09\/image-22-thumb2.png\" width=\"334\" \/><\/a>       <br \/>To disable, turn this setting off<\/p>\n<p>&#160;<\/p>\n<p>If you want to remove a name from the cache, then      <br \/>- start a new mail message and start typing the first characters of the name that you want to remove       <br \/>- When outlook displays the popup menu with addresses, select the address that needs to be removed and press Delete (Don't click on the name, but use the up\/down arrows to position the current selection and then press the Delete button)<\/p>\n<p>If you want to remove the entire cache (in case it gets corrupted or something like that), you can just close Outlook and remove the nk2 file.&#160;&#160; When outlook is started again, a new (empty) file will be recreated.      <\/p>\n<p>Tip : you can easily copy &amp; transfer this file to another computer or back it up (so you can restore it in case of crash)<\/p>\n<p>&#160;<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. Manage Attachment behaviour 1.1. Outlook 2007 Although you probably have deployed an antivirus solution in your messaging infrastructure, by default, Outlook blocks access to certain attachments, even if they have been scanned or not. After all, Outlook doesn't really know if an attachment has been scanned and is safe for you to open. The &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Outlook and OWA Tips &amp; Tricks\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[349,909],"tags":[509,489],"class_list":["post-625","post","type-post","status-publish","format-standard","hentry","category-exchange","category-outlook","tag-exchange","tag-outlook"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"1. Manage Attachment behaviour 1.1. Outlook 2007 Although you probably have deployed an antivirus solution in your messaging infrastructure, by default, Outlook blocks access to certain attachments, even if they have been scanned or not. After all, Outlook doesn&#039;t really know if an attachment has been scanned and is safe for you to open. The &hellip; Continue reading &quot;Outlook and OWA Tips &amp; Tricks&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2008-05-15T11:00:42+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Outlook and OWA Tips &amp; Tricks\",\"datePublished\":\"2008-05-15T11:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/\"},\"wordCount\":1615,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"MS Exchange\",\"Outlook\"],\"articleSection\":[\"MS Exchange\",\"Outlook\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/\",\"name\":\"Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2008-05-15T11:00:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/05\\\/15\\\/outlook-and-owa-tips-tricks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outlook and OWA Tips &amp; Tricks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/","og_locale":"en_US","og_type":"article","og_title":"Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"1. Manage Attachment behaviour 1.1. Outlook 2007 Although you probably have deployed an antivirus solution in your messaging infrastructure, by default, Outlook blocks access to certain attachments, even if they have been scanned or not. After all, Outlook doesn't really know if an attachment has been scanned and is safe for you to open. The &hellip; Continue reading \"Outlook and OWA Tips &amp; Tricks\"","og_url":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2008-05-15T11:00:42+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Outlook and OWA Tips &amp; Tricks","datePublished":"2008-05-15T11:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/"},"wordCount":1615,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["MS Exchange","Outlook"],"articleSection":["MS Exchange","Outlook"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/","url":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/","name":"Outlook and OWA Tips &amp; Tricks - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2008-05-15T11:00:42+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2008\/05\/15\/outlook-and-owa-tips-tricks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Outlook and OWA Tips &amp; Tricks"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":5239,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/625\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}