Upcoming: Enhanced security with file upload restrictions
To enhance the security to file uploads, we are implementing additional protective measures to safeguard users. This update will ensure safer file management, protect against potential vulnerabilities, and bolster overall data security by restricting the upload of certain file types known to carry risks.
Key benefits of this update
Increased security: Helps prevent malicious executable and script files from being uploaded, reducing potential threats to your data and systems.
Enhanced compliance: Aligns with best practices for secure file handling and data protection.
Proactive protection: Strengthens defenses against file-based vulnerabilities and cyberattacks.
Details of the change
We will be restricting the upload of 72 specific file formats that include executable, script, disk image, installer, and other potentially risky file types.
Note:
This change will be live in 2 weeks from the time of this post.
Restricted file formats
Executable files (23):
EXE, MSI, BAT, CMD, SH, COM, SCR, PIF, APK, JAR, GADGET, HTA, DLL, OCX, SYS, MSC, CPL, OSX, OUT, APP, RUN, EX_, and PRG.
Script files (16):
JS, VBS, PS1, WSF, PY, RB, PHP, PL, JSE, VBE, MSH, MSH1, MSH2, MSHXML, MSH1XML, and MSH2XML.
Disk image files (6):
ISO, DMG, BIN, IMG, VHD, and VMDK
Other restricted file formats (27):
KSH, VBSCRIPT, PAF, INS, U3P, SHS, IPA, SCT, RGS, COMMAND, SHB, INX, WS, INF1, ISU, MSP, WORKFLOW, CSH, MST, LNK, VB, CAB, JOB, REG, ACTION, WSH, and APPIMAGE.
For more information and support, please contact support.