Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Outlook blocked access to the following potentially unsafe attachments: [] Outlook 2010

Posted on 2011-03-08
3
Medium Priority
?
1,700 Views
Last Modified: 2012-05-11
Hi, Is there a way to recover a document once it's been blocked by outlook? Thanks. Running Office 2010 on Windows 7.
0
Comment
Question by:mel200
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
8ubterfug3 earned 2000 total points
ID: 35071058
Unfortunately you will not be able to recover the file once it has been blocked. You can however try the suggestions in the following KB article to remedy the issue going forward...
http://support.microsoft.com/kb/829982
0
 

Author Closing Comment

by:mel200
ID: 35071441
thanks... too bad however. It was a pdf, nothing too scary. :)
0
 

Author Comment

by:mel200
ID: 35071483
FYI, if you follow the instructions for the new registry key, you can then open the attachment within the original email. Or at least I can.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is about my experience upgrading my consulting machine to Windows 10 Version 1709 (The Fall 2017 Creator Update)
Take a look at these 6 Outlook Email management tools which can augment the working and performance of Microsoft Outlook to give you a more rewarding emailing experience.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question