Last reviewed on May 8, 2014   —  2 Comments

A virus infected email is making the rounds, purportedly from Microsoft, updating their service agreement. It looks like the real message but the URLs point to another site, typical of a phishing scheme. The real Microsoft service agreement email's links point to urls like, which redirects to a legitimate Microsoft webpage.

At least one version of the infected message includes an embedded external HTML file:

<img src="http://{infected-site}/index.html">

The problem? When you download external content, either automatically or per message, that file will be saved to the hard drive and it will be rendered in Outlook. In this case, the HTML file is going to be rendered. While Outlook renders HTML in the Restricted zone, it appears this week's Java exploit may be able to run the Java applet in the embedded HTML. (I'm investigating this angle.)

When you view a message (either in the reading pane or open message) and allow external content, the content is downloaded and stored in the Temporary Internet Files folder (type shell:cache in Windows Explorer address bar) and displayed in Outlook. When the file is saved to the

As one of the complainers who helped convince the Outlook team we needed the ability to block web bugs, my recommendation is never download content automatically. Don't trust external content from any address.

Don't download external content by default. No exceptions. Don't trust anyone.

With external content blocked by default, mail loads faster, web bugs aren't sent back to the sender and most importantly, blocking external content may prevent this java exploit from infecting your computer.

Messages sent with external content are almost always "bulk mail" - messages from advertisers and spammers. In most cases, the blocked content is a logo and style sheets, adding eye-candy but not content. You won't miss much by not downloading this content. In the case of advertisements that are all images, you can easily download the content when the message subject or text in the body is enticing enough to convince you that the blocked content is worth reading. (Take note advertisers: use more text, fewer external images!)

If you block external content *and* do not trust anyone, the HTML will not download and the Java definitely won't run.

Reading all mail in plain text is also an option. This is less desirable in my opinion: HTML messages displayed as plain text are harder to read and you will display more messages in HTML than you will enable external content on. It doesn't increase your security by an appreciable amount. Comparing cost (time spent enabling HTML per message) vs benefit (no risk compared to small risk), blocking external content has a good ROI.

In addition to blocking external content, these recommendations will help to increase your safety:

  1. Always hover over hyperlinks before clicking and ensure they are pointing you to legitimate sites before clicking. Look closely at the urls to insure they are not trying to fake you out with "" addresses.
  2. Look at the message's Internet headers if you aren't sure the message is legitimate.
  3. Consider disabling Java. It's too full of holes.
  4. Keep your antivirus and antimalware up to date.

Recommended settings for external content

Do not download external content, even for trusted sendersTo block external content in Outlook 2010 and 2013, go to File, Trust Center, Automatic Downloads. My recommendation: don't download any content and always warn before replies.

(If you want to read all mail in plain text, the setting is on the E-mail Security tab.)

In Outlook 2007, block content from the Tools, Trust Center menu. In Outlook 2003, the blocked external content settings are in Tools, Options, Security, Change Automatic Download Settings.

Enable blocked content per message

When you are reading a message and want to view the content, click on the Infobar and download external content for that message. You only need to do this once per message, Outlook will remember until the Temp Internet Cache is emptied.

Display blocked external content for a specific message


  1. Cavehomme says

    Good tips. However, by enabling only downloads from trusted senders in the Outlook settings surely deals with this issue, or not?

    • Diane Poremsky says

      Not necessarily. If an exploit sends mail using a faked address of a trusted contact or infects a trusted person or company's computer and send mail from them, you are at risk. Because everything has to come together just right (use outlook, trust their address, mail gets past content scanners etc), the risk may not be much but its not zero.

      If you don't have java installed, there should be no additional risk as the danger is in an exploit that can bypass normal security measures and at this time, only java exploits can do this.

Leave a Reply

Please post long or more complicated questions at OutlookForums by

If the Post Comment button disappears, press your Tab key.