A few trustworthy programs may access contacts or e-mail messages to retrieve e-mail addresses for various reasons, but unsuspecting users have been affected by some viruses that do the same in order to propagate. In order to spread through e-mail messages, these viruses send e-mail messages that contain their malicious code to other users. Usually, this occurs without a user being aware of it.
The security features built into Outlook 2002 make discernible these processes that are usually transparent to the user.
Once you have verified that the program or add-in accessing e-mail addresses or sending e-mail messages on your behalf is trustworthy, you can choose to allow it to access the e-mail addresses or send the e-mail messages.
One example of a program that accesses Outlook e-mail addresses is the Component Object Model (COM) add-in installed by ICQ 2000. For more information, please see the following article in the Microsoft Knowledge Base:
How to Customize the Security SettingsIn a Microsoft Exchange Server environment, an administrator may want to control Outlook's security behavior. For more information, please see the following Microsoft Knowledge Base articles:
รหัสบทความ: 290498 - การตรวจสอบครั้งสุดท้าย: 27 ก.ค. 2006 - ฉบับแก้ไข: 1