What is MacroKiller for Exchange?

Created by Daniel Calkin, Modified on Mon, 3 Feb at 5:51 PM by Daniel Calkin

Overview and Configuration of MacroKiller for Exchange

This document explains the configuration options that are available to an Exchange administrator, and also shows how to enable and disable the software until you are comfortable with MacroKiller.


Description

MacroKiller is an Exchange Transport Agent that converts Word and Excel documents that contain macros into Macro-free versions that cannot infect your users.


Key Features

  • Strips Macros out of Word and Excel documents
  • Users receive clean, virus free documents
  • Using the 100% safe Word.DOCX and Excel.XLSX formats
  • Users CANNOT infect themselves
  • Original Documents saved in Password protected ZIP file
  • Whitelists skip processing for trusted senders


Other Features

  • Whitelist a Sender or Domain: This will never process messages from this Sender or Domain
  • Testing Configuration: You can set MacroKiller to run for selected users during a test by listing "Included Recipients".
  • In production, you can always exclude a recipient's messages from being converted via "Excluded Recipients". 


Configuration Options

The table below describes the various configuration options, as well as the default values that we use to set the initial configuration. It also shows optional settings.


Our default settings is AlwaysConvertToMacroFree for valid Word documents, and to Reject or ZipWithPassword any Invalid Word documents, including those with no "words" (less than 50 characters).


OptionValues / Usage
File ExtensionsDocument types to scan for macros
.DOC, .DOCM, .DOCX, .RTF, .XLS, .XLSM, .XLSX

Default: .DOC, .DOCM, .DOCX, .RTF, .XLS, .XLSM, .XLSX
MacroRemoval[?, N, None, R, Remove, C, ConvertToMacroFree, A, AlwaysConvertToMacroFree, J, Reject]

Default: AlwaysConvertToMacroFree
PreserveOption[?, N, None, Z, ZipWithPassword, C, ConvertToMacroEnabled]

Default: ZipWithPassword
Note: This option allows you to save the original document in a password protected zip file.
SafeViewingOption[?, N, None, P, ConvertToPdf, T, ConvertToTxt]

Default: None
InvalidFileOption[?, E, ChangeExtension, D, Delete, Z, ZipWithPassword, R, Reject]

Default: R
FilePasswordThis is the password used to secure a .zip file if any of the 'ZipWithPassword' options are used.

Default: Caution
ZipFileNameThis is the name of the .zip file that will get created if any of the 'ZipWithPassword' options are used

Default: PossibleMalware.zip
MinimumCharactersWord docs with no words will be handled as InvalidFileOption (Reject)

Default: 50
CustomRejectMessageThis will be used only if messages are "Rejected"

Default: Maysoft.com DOES NOT accept Word files with macros
ActivityToLogThese are logged to the Windows Event Viewer

Errors, MacroRemoval, PreserveOption, SafeViewingOption, Zip, MinimumCharacters, InvalidFileOption, Reject

Default: Errors, MacroRemoval, PreserveOption, SafeViewingOption, Zip, MinimumCharacters, InvalidFileOption, Reject
RecipientsThis option allows you to process for selected names, or to exclude selected names

There is not default value for this option
RecipientLookup[0ptions= ?, D, Disabled, I, Included, E, Excluded]

Default: Disabled
IncludedRecipients# Included means MacroKiller only converts and processes Word and Excel docs for named individuals

There is not default value for this option
ExcludedRecipients# Excluded means MacroKiller does NOT convert or process Word and Excel docs for named individuals.

There is not default value for this option
Enable WhiteListThis is a master switch to enable use of the different WhiteList types (see below).

[? D, Disabled, S, Senders]

Default: Senders
WhiteListSenders# Email from listed addresses will not be checked by MacroKiller
i.e [email protected], [email protected]

There is not default value for this option
WhiteListDomains#Email from the listed domains will not be checked by Macrokiller
i.e. maysoft.com, acme.com

There is not default value for this option 



Administrator Information

Below is a Powershell session where MacroKiller can be installed, uninstalled and reconfigured. We have added some new commands, like Get-MacroKiller which shows the current configuration. 


Do disable Macrokiller which can be useful during testing:

Set-MacroKiller -Enabled $false


To enable Macrokiller

Set-MacroKiller -Enabled $true


You can also run this command to disable the Transport Agent completely:

Disable-TransportAgent "MacroKiller"


When installed, it is always the last Priority in the list of Transport Agents:




Event Viewer


When MacroKiller processes a document, the action can be recorded in the Event Viewer.  Which actions are recorded depends on the configured options.




What the Outlook User Sees

1. The original .DOC file is converted to a Macro-free .DOCX document, which the user can freely open.

2. Optionally you can preserve the original .DOC in a password protected ZIP file. We recommend to perform just the conversion. If you need to receive macros from this sender, whitelist the sender and resend. Why?  Because 98% of these Zip files contain Malware and users have opened them and infected themselves.




Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article