Allow rar, zip extensions in MS ForeFront

Posted on 2009-05-02
Last Modified: 2012-06-21
Hi every time I want to send or receive rar file i get this message in email:


Microsoft Forefront Security for Exchange Server removed a file since it was found to match a filter.
File name:
Filter name: "FILE FILTER= unnamed: *.rar"

I have tried to configure the filter in MS ForeFront but with no luck. Can someone tell me how to do it.
Question by:majox
    LVL 15

    Accepted Solution

    this article refers to Filefront Beta 2 - but I'm betting that the same concepts hold for the street release

    Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management Gateway Beta 2 (Part 2)

    Expert Comment

    I have the same problem, I tried to follow this istruciotn in thi microsoft articles, but form me it doesn't work:
    Excluding the contents of a container file from file filtering
    To exclude the contents of a .zip (container file) from being scanned for filter matches, specify the name of the .zip file in the file filter list and set the action to Skip. Ordering of the filter in the list is not important. If the name of the .zip file is in the file filter list and its action is set to Skip, its contents are not scanned by the file filters. The file is, however, scanned for viruses. If you would like to skip all .zip files, create the filter: *.zip and set the action to Skip.

    By default, this functionality only applies to .zip and .jar files. If you would like to enable this functionality for other archive types (TAR, GZIP, RAR, Macintosh, SMIME, and Self-Extracting .zip archives), you can set the following DWORD registry values:
    Realtime Scan Job   SkipFileFilterWithinCompressedRealtime
    Manual Scan Job   SkipFileFilterWithinCompressedManual
    Transport Scan Job   SkipFileFilterWithinCompressedInternet
    For the location of these registry keys, see Registry keys. After creating each registry value, it should be set to 1 to enable file filtering in the specified archive types.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Suggested Solutions

    Title # Comments Views Activity
    Outlook setting 3 32
    Exchange Server 2010 to 2016 and load balancing 2 25
    EXCH2013 and DAG 11 13
    spamming  on Hosted svrs? 6 24
    Create high volume marketing opportunities using email signatures with these top 10 DOs and DON'Ts of email signature marketing.
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
    In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now