My Exchange email service is currently being used illegitimately as a spam relay. This was noticed weeks ago, but we had problems getting the server itself to cut this out, so I modified the Raptors SNMP service properties (in the rule for our email) to only allow email to our domain.
That stopped a lot of spam and allowed us to fail (pass) some 17 relay tests.
However, we are still a relay. It is definately coming from the outside.
I want to try to lock down the SNMP rules a bit more but don't want to go clicking blindly, so what do these options in SMTP/advanced do?
Loose recipient checks
Loose sender checks
What I want to do is disallow users not using an internal email address to send email. We get messages in our Exchange IMC queue that are from <>.
Neither the online help nor the books we paid $4k for mention the SMTP advanced properties, and I don't even want to get into my call to tech support. Any help is appreciated, thank you.
Further note: we still fail (pass) email relay tests. As far as those go we are fine. But I've got laggy bandwidth and gobs of sniffer logs proving our email server is being abused.
That stopped a lot of spam and allowed us to fail (pass) some 17 relay tests.
However, we are still a relay. It is definately coming from the outside.
I want to try to lock down the SNMP rules a bit more but don't want to go clicking blindly, so what do these options in SMTP/advanced do?
Loose recipient checks
Loose sender checks
What I want to do is disallow users not using an internal email address to send email. We get messages in our Exchange IMC queue that are from <>.
Neither the online help nor the books we paid $4k for mention the SMTP advanced properties, and I don't even want to get into my call to tech support. Any help is appreciated, thank you.
Further note: we still fail (pass) email relay tests. As far as those go we are fine. But I've got laggy bandwidth and gobs of sniffer logs proving our email server is being abused.