The dev-op team from odix is pleased to announce that our full range of content disarm, and reconstruction solutions now have advanced static analysis capability which can block, whitelist and exclude suspicious HTM/L attachments, providing another level of file protection and sanitization to our already robust anti-malware engines.

The addition of the HTM/L static analysis blocker was driven directly by an increasing market need to prevent the infiltration of malware through this format.

Experience leads to improvement

While some product developments are driven by lofty goals or perceived threats, odix’s implementation of the HTM/L blocking process was spurred by an email with a malicious HMT/L attachment received by our CEO. After realizing both the potential risk and frequency of HTM/L based attacks, it was only logical to try an implement a solution to decrease the threats of HTM/L links within our broader file sanitization process.

How does it work?

In line with the standard CDR process, files are broken down into individual elements and purged of malicious elements and reconstructed to produce a malware free file. With the integration of the HTM/L whitelist/blocker, our solutions are now able to provide near instantly sanitized and safe files with ut the threat of malicious HTM/L causing loss to data and brand standing.

To maximize protection capabilities, all malicious and potentially suspect HTM/L attachments will be automatically removed from the reconstructed file and blocked by default with an additional filtration process in addition to the standard CDR sanitization.

Does this impact latency?

As the integration of the HTM/L blocker is fully embedded into the odix TrueCDR process, no additional time is added to the standard sanitization time frame, and end user continue to be able to access the fully malware free attachment within seconds.

How can I find out more?

To learn more about FileWall, odix native CDR security solution for the Microsoft 365 ecosystem as well as our range of cloud based and on-prem products please visit To keep up with our cyber research and recent malware finds check out