Checklist: Using software restriction policies to help protect your computer against an e-mail virus

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

Checklist: Using software restriction policies to help protect your computer against an e-mail virus

Step Reference

Review best practices for software restriction policies.

Software Restriction Policies Best Practices

Open Software Restriction Policies.

Open Software Restriction Policies

If you have not previously defined software restriction policies, create new software restriction policies.

Create new software restriction policies

Create a path rule for the folder that your e-mail program uses to run e-mail attachments, and then set the security level to Disallowed.

Create a path rule

Specify the file types to which the rule applies.

Add or delete a designated file type

Modify policy settings so that they apply to the users and groups that you want:

  • Specify users or groups to which you do not want the Group Policy object's (GPO) policy settings to apply.

  • Exclude local administrators from the software restriction policies of a specific policy setting in Group Policy and still have the rest of Group Policy apply to the administrators.

Group Policy (pre-GPMC); Prevent software restriction policies from applying to local administrators