In this article we can explore the scenario to block malicious files by content.
Your customer reported a specific feature on All the document libraries in a site. The document libraries should accept uploading of Executable files (.exe) plus a virus check has to be done on the content. If the exe files are infected then the upload should be aborted.
In this case you can create a Global Event Handler for all the document libraries. This event handler is invoked whenever a file is being uploaded. A virus check can be performed based on the Antivirus software installed. The upload can be aborted using the Cancel property in the event handler method.
Following are the steps involved in implementing the solution:
· Manage the Blocked File Types
· Test an exe file insertion into Library
· Create the Event Receiver
· Make the Event Receiver Global
· Test the Application
Manage the Blocked File Types
As you might have noticed the executable extension (.exe) is blocked in all SharePoint libraries. This restriction can be removed by using Central Administration.
In our case we need to allow this extension (.exe) and later our own event handler will do the file scanning for adding to the library.
To change the restriction open Central Administration > Security link.
In the appearing page click on the Define blocked file types link as shown below:
In the appearing page you can see that there are lots of extensions being blocked. Remove the exe entry from the list and click the OK button.
Test an exe file insertion into Library
After making the change (removing exe extension) you can try inserting an exe file into a document library. For the time being I tested inserting Calculator (c:\windows\system32\calc.exe) into my library.
Now I was able to successfully insert an exe file into the library.
Note: Please make sure that you selected the right web application from the right top menu.
Create the Event Receiver
Our job is not finished yet. The current situation may create a Security Threat of malicious exe files being uploaded by users unknowingly. Later other users may execute it and create chaos. So we need to ensure that the content of the Executable file is not having any malicious code inside it.
The actual way of scanning the exe file is to integrate some third party Anti-Virus SDK with our application. As this exceeds our scope of the article I prefer checking the exe file name containing any special characters like !, @, #. If any of the characters found the file will be cancelled from insertion and a message will be shown to the user.
Now let us create the event handler which blocks the file if file name contains special characters.
Create a new project of type Event Receiver inside Visual Studio 2010. Name the project as GlobalEventReceiver.
Choose the site for the project and In the Event Receiver Settings dialog select the options like Document library and Add, Update events as shown below:
Click the Finish button to continue.
In the appearing event file replace the Item Adding event as following:
public class EventReceiver1 : SPItemEventReceiver
public override void ItemAdding(SPItemEventProperties properties)
if (properties.List is SPDocumentLibrary)
if (properties.AfterProperties != null)
if (properties.AfterProperties["vti_filesize"] != null)
if (properties.AfterUrl != null)
if (properties.AfterUrl.Contains("!") || properties.AfterUrl.Contains("@") || properties.AfterUrl.Contains("#"))
properties.Cancel = true;
properties.ErrorMessage = "Potential malicious content in file!";
The event is invoked with the SPItemEventProperties server object model which contains the document, url and related properties. As we are making this event Global, all the lists and libraries will be invoking this event handler.
To prevent the event being blocked in Lists/Folders we are ensuring the properties.List is of type Document Library in the first if block.
In the second and third if blocks we are ensuring the file size is not null.
In the fourth and fifth if blocks we are ensuring the file url does not contains the special characters like !, @, #. (our dummy malicious check)
If the malicious check resulted in true, then the Cancel property is set to true, which will prevent the file being inserted. An Error Message is set for the user.
Make the Event Receiver Global
The current event receiver is hard coded for document template Id 101. We need to make this global so that all the document libraries will be attached to this event.
Open the Elements.xml from the EventReceiver1 folder.
Remove the ListTemplatId="101" attribute from the Receivers tag (third line) as below:
<?xml version="1.0" encoding="utf-8"?>
Now build the application.
Test the Application
Execute the application and in the launched SharePoint site, open a document library and try to add an exe file with a "@" character in the file name.
For example: firstname.lastname@example.org
You should get the following error:
So this confirms the Global Event Handler at work.
Note: The Item Add event handler is needed to handle document insert event. The Item Update event handler is needed to handle the document update event.Note: The scenario explained above is for conditional blocking purpose and in the real world the same Global Event Handler mechanism can be used to handle other situations like:
· Prevent PDF file insertion on Document Libraries
· Disable Copy Paste between different document library types
· Disable file insertion based on validation etc.
In this chapter we have approached a real world scenario to create a global event handler. The same mechanism can be extended to resolve other complex requirements associated with list/library item add/update/delete.