Solved

check outgoing mail for possible use by unwanted spammers

Posted on 2003-12-11
6
208 Views
Last Modified: 2013-12-04
hi

we are running a webserver win 2000/IIS together with the mercur mailserver (www.atrium.de).
even if we have the imprssion that we configured the mailserver to be quite safe
we have the impression that it is being misused by spammers :-(

is there any way to "monitoring" all outgoing mail in a convinient way to figure out if the mailserver is used by not authorized users. some sort of tool where we could see all outgoing mail listed in a handy way. this because reading the mailserver protocol is a bit of a hazzle...

any hints, especially on the mercur mail server are very much appreciated.

thank you in advance / joergen astroem
0
Comment
Question by:jastroem
  • 4
  • 2
6 Comments
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 9937306
sure it is posssible. as for specific solution, it depends on what email server you have.
0
 

Author Comment

by:jastroem
ID: 9937371
we are running the mercur mailserver

/ joergen astroem
0
 
LVL 37

Accepted Solution

by:
Bing CISM / CISSP earned 300 total points
ID: 9938193
i noticed that mercur mail server has built-in anti-spamming feature for outgoing messages, you may even can specify the following protection mechanisms to customize your solution:

1. Check name of sending host
2. Reject mail, if originator domain has no MX record
3. Do not relay, if the originator address is not local
4. Do not relay, if the originator domain is not local
5. Reject incoming mail, if number of external recipients exceeds
6. Info to administrator, if number of external recipients exceeds

for more information how about how to configure it step-by-step, see page 110 of "MERCUR Mailserver Version 4 Usermanual", download at: http://www.atrium-softwareusa.com/EN/manuals/mcrmanualpdfen.zip

if you have any further questions, please let us know.

hope it helps,
bbao
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 10044389
any feedback please?
0
 

Author Comment

by:jastroem
ID: 10045858
dear bbao

i'm sorry that i forgot this question.
we've fixed the problems, and your information was a good help!

thank you very much
joergen
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 10045877
thanks for your points and grade, have a nice day! bbao
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now