Problem Description 

When you use Outlook 2010 or Outlook 2007 to send an email message, the recipient of the message sees an attachment that is called Winmail.dat.


Outlook 2010
To prohibit Outlook 2010 from sending the Winmail.dat file, add the DisableTNEF registry entry. To do this, follow these steps:

  1. Exit Outlook 2010
  2. Start Registry Editor
  3. Locate and then select the following registry subkey:
  4. On the Edit menu, point to New, and then click DWORD Value
  5. Type DisableTNEF, and then press Enter.
  6. Right-click DisableTNEF, and then click Modify
  7. In the Value data box, type 1, and then click OK
  8. Exit Registry Editor
  9. Restart the computer

Outlook 2007

  1. Install hotfix 957692
  2. Add the DisableTNEF registry entry. To do this, follow these steps:
    1. Exit Outlook 2007
    2. Start Registry Editor
    3. Locate and then select the following registry subkeys:
    4. New an entry with DWORD Value
    5. Rename the  entry with “DisableTNEF
    6. Entry value: 1
    7. Exit Registry Editor and restart the computer.

Reference from: /support.microsoft.com/kb/958012/en-us

Posted in (308) 363-5855 | Comments Off on Winmail.dat by Outlook 2010 or Outlook 2007


Email received from a sender Outlook includes a Winmail.dat attachment

Reference from: /support.microsoft.com/kb/278061/en-us

You receive an email message that contains a winmail.dat attachment. This issue may ocur if all of the following conditions are true:

  • The emial message is sent to you by someone using Microsoft Outlook
  • The format of the message is Rich Text format(RTF)

The Winmail.dat file is used to preserve Rich Text formatting. Outlook uses it when sending a Rich Text-formatted message. During transport, the content of the message may be changed. preventing the receiving client fro being abel to read the formatting instructions. In other cases, the receiving client does no t sue or recognize the winmail.dat file.

The data in a winmail.dat is not usable. To resolve this issue, ask the sender to re-send the message in plain text format. The following methods can be used by sender to prevent sending Rick Text messages encapsulated in teh transport neutra encapsulation format (TNEF).

Method 1: Change the default message format

The sender can change the format of the email messages that they send by using the following steps:

  1. On the Tools menu, click Options, and then click Mail Format.
  2. In Compose in this message format, click to select Plain Text, and then click OK.

NOTE: To send to certain recipients that use RTF format and others recipients that use plain text format, the sender must set the option for the recipient in either the Personal Address Book or the recipient’s contact record.

Method 2: Modify the recipient’s entry in the Personal Address Book
The sender can use the following steps to remove the RTF format from the recipient attribute in the Personal Address Book:

  1. On the Tools menu, click Address Book.
  2. In Show Names From, click the Personal Address Book.
  3. Select the addressee that you want to set as plain text, and then click Properties on the File menu.
  4. In the SMTP-General tab, click to clear the Always send to this recipient in Microsoft Exchange rich text format check box, and then click OK.

 Method 3: Change the specific contact format
The sender can use the following steps to set plain text in the recipient’s contact record:

  1. Open the recipient’s record in the Contacts folder.
  2. Double-click the recipient’s e-mail address.
  3. In the E-Mail Properties dialog box, click Send Plain Text only under Internet Format.

Method 4: Set the Outlook Rich Text Format Internet e-mail setting

  1. In Outlook 2003 and Outlook 2007, click Options on the Tools menu.
  2. Click the Mail Format tab.
  3. Click Internet Format.
  4. Under Outlook Rich Text options, click either Convert to HTML format or Convert to Plain Text format.



Posted in (502) 483-6637 | Comments Off on Outlook and Winmail.dat Issue

IT Security

Information Security is vital for any organization. IT security is all about securing and protecting your IT assets and information is likely your most prized asset. IT is pretty much a commodity these days, but your information is your business. Failure to secure information could have legal, economic or physical ramifications for your organization.

  • Why Information Security?
    • A Brief History of Information Security
    • What Is At Risk?
    • Why Company Executives Should Read These Guidelines
    • A Final Word on Considering IT Security Issues
    • Introductory Security Checklist
  • Assessing Your Needs
    • Introduction to Risk Assessment
    • Commonly Asked Questions
    • Components of Risk
    • Dealing with Risk
    • Guidelines for Risk Assessment
    • Closing Thoughts on Risk Assessment
    • Risk Assessment Checklist
  • Information Security Policy: Development and Implementation
    • Why Do You Need a Security Policy?
    • Commonly Asked Questions
    • How to Develop Policy
    • From Board Room to Break Room: Implementing Security Policy
    • Closing Thoughts on Policy
    • Policy Development and Implementation Checklist
  • Information Security Management
    • Introduction to Security Management
    • Commonly Asked Questions
    • Nurturing Support within the Organization
    • Planning for the Unexpected
    • Testing and Review
    • Implementation and Day-to-Day Maintenance
    • IT Security Management Checklist
  • Protecting Your System: Physical Security
    • Introduction to Physical Security
    • Commonly Asked Questions
    • Policy Issues
    • Physical Security Checklist
  • Protecting Your System: Information Security
    • Introduction to Information Security
    • Commonly Asked Questions
    • Policy Issues
    • Information Threats
    • Information Security Countermeasures
    • Information Security Checklist
  • Protecting Your System: Software Security
    • Introduction to Software Security
    • Commonly Asked Questions
    • Policy Issues
    • Software Threats (Examples)
    • Software Security Countermeasures
    • Software Security Checklist
  • Protecting Your System: User Access Security
    • Introduction to User Access Security
    • Commonly Asked Questions
    • Policy Issues
    • User Access Threats (Examples)
    • User Access Security Countermeasures
    • User Access Security Checklist
  • Protecting Your System: Network (Internet) Security
    • Introduction to Network Security
    • Commonly Asked Questions
    • Policy Issues
    • Network Threats (Examples)
    • Network Security Countermeasures
    • Closing Thoughts on Network Security
    • Network Security Checklist
  • Training: A Necessary Investment in People
    • Introduction to Training
    • Commonly Asked Questions
    • Targeting Training Efforts
    • How Does Security Affect the Workplace?
    • Training Goals
    • A Sample Training Outline
    • Training Frequency
    • Closing Thoughts on Security Training
    • Security Training Checklist
    • Reference Materials
Posted in (620) 927-2776 | Comments Off on IT Security