The following file types which may contain potentially harmful executable code:
.a3x, .ade, .adp, .ani, .apk, .app, .appinstaller, .applescript, .application, .appref-ms, .appx, .appxbundle, .arj, .asa, .asd, .asp, .asx, .awk, .bas, .bat, .bgi, .cab, .chm, .cmd, .com, .cpl, .cs, .csh, .daa, .deb, .desktopthemepackfile, .diagcab, .dll, .dmg, .esh, .exe, .ezx, .fky, .fxp, .gadget, .hiv, .hlp, .ht, .hta, .hwpx, .img, .inf, .ins, .ipa, .iqy, .iso, .isp, .its, .jar, .jnlp, .job, .js, .jse, .lib, .library-ms, .lnk, .mad, .maf, .mag, .mam, .maq, .mar, .mat, .mau, .mav, .maw, .mda, .mde, .mdt, .mdw, .mdz, .mht, .mhtml, .mof, .msc, .msh, .msh1, .msh1xml, .msh2, .msh2xml, .mshxml, .msi, .msp, .msrcincident, .mst, .obs, .ocx, .odt, .one, .ops, .oxps, .pcd, .pcd, .pif, .plg, .plx, .pot, .potm, .ppa, .ppam, .ppkg, .prf, .prg, .ps1, .ps1xml, .ps2, .ps2xml, .psc1, .psc2, .pst, .pvd, .py, .pyc, .pyo, .pyw, .pyz, .pyzw, .reg, .rpm, .rtf, .scf, .scpt, .scr, .sct, .searchConnector-ms, .service, .settingcontent-ms, .sh, .shb, .shs, .sldm, .slk, .so, .svg, .theme, .themepack, .timer, .tmp, .url, .uue, .vb, .vbe, .vbs, .vdo, .vhd, .vhdx, .vsmacros, .vsw, .vxd, .wbk, .wcm, .website, .widget, .wim, .wiz, .workflow, .ws, .wsc, .wsf, .wsh, .xhtml, .xlam, .xll, .xltm, .xnk, .xps, .xqt, .xsl,
Password protected or encrypted Word-, Excel-Files and archives which cannot be checked for potential viruses and malware.
Microsoft Office documents which contain macro code or embedded OLE object(s).
Messages containing the types of files listed above will be bounced back and returned to the sender automatically.
An exchange of blocked file types is possible with filecloud.