Last reviewed on May 8, 2014   —  7 Comments

Viruses can involve current versions of Microsoft Outlook in one way:

In the past, viruses took advantage of Outlook’s programming capability and weak security and used these methods to propagate:

  • Messages exploiting certain vulnerabilities in HTML mail can force a malicious file attachment to run even if the user only views it in the preview pane or opens the message. Getting the latest patches for Internet Explorer provides protection.
  • Because of Outlook’s easy-to-use programming model, viruses can propagate themselves by reading the Outlook address books and sending new virus-infected messages to everyone found there. However, virus developers seem to be aware of the new security provisions in Outlook, because the latest viruses have included their own SMTP engine to send messages, thus avoiding Outlook’s security prompts.

Beginning with the Outlook 2000 post-SP1 security update, it’s unlikely that anyone will be affected by the HTML vulnerabilities  or viruses that use the address book to propagate. While older versions of Outlook are still in use, virus writers moved on and found newer and better ways to infect computers. In most cases, they use some form of social engineering to convince users to open attachments which then install the virus.

These exploits are not limited to Outlook users – anyone who uses email is at risk from these new viruses – and any that viruses that collect addresses from your computer are more likely to get the addresses from a compromised web-based email account or social media account, not Outlook’s address book.

The best way to avoid a virus infection is to think before opening attachments: if the email message doesn’t make sense, don’t open the attachment.

One time, long, long ago, Outlook’s preview pane was insecure but it’s now slightly more secure than opening a message to read it. In either case, thanks to Outlook’s inability to use “active content” it’s safe to read mail in either the reading pane or an opened message.

This page provides information on how to protect your computer from Outlook-related viruses. While the tips target Outlook, many of the tips apply to any email client.

More Information

Outlook Client Protection

To protect your machine from becoming infected with a virus received via Microsoft Outlook, you should:

Install the latest service packs and updates for your version of Outlook

Update Outlook, Internet Explorer, and other Windows components

Tighten e-mail attachment security

  • Block additional file types by adding extensions to the Level1Add key.
  • Consider installing the Outlook E-mail Security Update. We do not recommend this patch for all systems. Do not install it unless you read the documentation and understand what it will do to your add-ins.If you install the Outlook E-mail Security Update, you may also want to install these updates that depend on it:
  • If you choose not to install the Outlook E-mail Security Update, take these steps:
    • Install the Attachment Security Update for Outlook 97 or Outlook 98 or install Office 2000 Service Release 1/1a (SR1). SR1 includes a feature to extend attachment security protection to any type of file.
    • If you are using Outlook 98 or Outlook 2000, increase the security for HTML mail by following these additional steps to control the security zone for Outlook messages:
      1. Use Tools | Options | Security to set the security zone for Outlook HTML mail to Restricted Sites.
      2. Click the Zone Settings button, then OK.
      3. Select Custom, and then click the Settings button.
      4. On the Security Settings dialog box, choose Disable for all options under these headings:
      • ActiveX Controls and plugins
      • Scripting
      1. Click OK three times to save the updated security settings.
    • You may also want to tighten scripting even in the Restricted Sites zone. See Outlook Does Not Restrict Access to EML Attachments.
  • See Scanning for File Attachments for more ideas on tightening e-mail attachment security.

Practice good anti-virus safety

  • Never open a file attachment that you did not expect to receive.
  • Install an anti-virus program, keep it updated and scan all attached files before opening them. Remember that an anti-virus program may not protect you against the very latest viruses. It may only be as good as your last update.

Other optional protection ideas

  • You may want to tighten the ability of Windows Script Host to run scripts on your system.
  • On Outlook 98 and 2000, you may also want to use Chilton Preview, rather than the built-in preview pane, because Chilton Preview does not support HTML mail and, therefore, does not leave you vulnerable to a malicious HTML mail message.
  • You can use VBA code in Outlook 2000 or 2002 to convert all incoming HTML messages to either rich text or plain text. See To convert incoming HTML messages to Outlook Rich Text or plain text format.
  • Configure Outlook 2003 to display all messages in plain text. Tools, Options, Preferences, E-mail Options and check the box to Read all standard mail in plain text.
  • Use the Microsoft Personal Security Advisor to check for issues with permissions, hotfixes and other possible security vulnerabilities.

Scanning for File Attachments

Instead of blocking certain file attachments, you may want to look at these methods of controlling what happens to attachments.

Also, make sure you know what type of file is actually attached. Some viruses use a double file extension, such as .jpg.vbs. If Windows is set not to show the extension for known file types, the recipient will see the attachment listed as a harmless .jpg file, not a potentially dangerous .vbs file. The solution is to use Tools | Folder Options or View | Options, depending on your Windows version, to change the setting to show extensions for all files.

Confirming File Transmissions

If you are concerned about viruses that use Outlook to propagate, you may want to require confirmation of all outgoing messages that contain file attachments. For a code sample, see:

Another approach is to set up Outlook not to send mail automatically. For Exchange Server users, this means setting up offline folders, working offline and synchronizing periodically. For Internet mail users, the exact settings depends on your version of Outlook, mode and Internet connection type, but you’ll generally find the right options in Tools | Services, Tools | Accounts or Tools | Options.

Note, however, that the latest viruses include their own SMTP engine for sending mail, so these techniques may not actually block virus propagation.

More Information

Most versions of Outlook provide a way to filter largish incoming messages. See Download limits to combat Swen for details on this anti-virus tip.

If you want to provide protection at the server level, as well as on the client, these tools can help:

Also see:


  1. Peter Joffe says

    I am having trouble with email coming into me as 'returns. undeliverable. These are email that I never send out in the first place. They seem to come from mainly China. I have ruin all the virus systems that I can think of but somewhere there is a virus or worm that is generating these return. here is an example of the type of return that I get. ll the text is in Chines but this *** is the main culprit.
    This morning I got 196 "returns" on emails that I never even sent.
    Please help. T

    • Diane Poremsky says

      Some spammer is using your email address as the 'from' address - there is nothing you can do about it, other than create a rule to delete the mail. If any of the NDR's have the full header of the original message, triple check to verify it was not sent through your SMTP server (if so, change your password asap). You may want to consider changing your password regardless.

  2. Claude Taylor says

    I keep getting advertising e-mails that go to my junk folder. The sender is using a fake AT&T user name. My cable provider informed me that I have a virus that is causing this and wants to charge me to "fix" it. I was using Windows software to keep me safe. I have since used CCleaner to clean up my system, Malewarebytes anti-malware to clean the system and AVG 2014 to remove any virus. What am I missing?

    • Diane Poremsky says

      Did those products find anything? If the cable provider said you are infected (because of things their monitoring equipment picked up), you probably are - you are unlikely to get the mail your virus sends though, so it might be unrelated. The spam viruses have their own smtp server, they don't use outlook. If you look at the message header on the spam, the IP address in it will show if it comes from your computer or from another computer.

      If you called the cable company to ask about it and they said it was coming from you, they could be clueless. :)

      if you aren't sure how to read the header, you can post it here and I'll look at it. (I'll remove all personal information before approving it.)

  3. Claude Taylor says

    They did find some malware and it has been removed. No virus. I'm using Outlook 2007. I continue to receive multiple advertisements, but only to my ATT e-mail account. Here is the header, it look like to me that ATT is allowing this junk to go through. X-Antivirus: AVG for E-mail
    X-Apparently-To: via; Mon, 07 Jul 2014 18:24:20 +0000
    Received-SPF: pass (domain of designates as permitted sender)
    X-YMailISG: _J2ZEnYWLDu9QjNhT_1aP55Uvm5OK.woM0Y3.Wp4Mr14G0w4
    X-Originating-IP: []
    Authentication-Results: from=; domainkeys=neutral (no sig); from=; dkim=neutral (no sig)
    Received: from (EHLO (
    by with SMTP; Mon, 07 Jul 2014 18:24:20 +0000
    Received: from ([])
    by (frfwmxc13) with ESMTP
    id ; Mon, 7 Jul 2014 18:24:18 +0000
    X-Originating-IP: []
    Received: from ( by (PowerMTA(TM) v4.0r8) id g5syZQ4O2ez for ; Mon, 07 Jul 2014 11:24:11 PDT (envelope-from )
    Date: Mon, 07 Jul 2014 11:13:27 PDT
    Mime-Version: 1.0
    Content-Type: text/html
    From: Vydox Male Supplement
    Subject: [Bulk] =?UTF-8?Q?_cftaylor45_Get__your__free__trial__of__Vydox__Today!___?=

    • Diane Poremsky says

      It gets through in part because the SP{F record reduces the change it will be labeled spam:
      Received-SPF: pass (domain of designates as permitted sender)

Leave a Reply

Please post long or more complicated questions at OutlookForums by

If the Post Comment button disappears, press your Tab key.