Solved

e-mail authentication

Posted on 2004-10-17
4
188 Views
Last Modified: 2010-04-10
How do I go about securing e-mail authentication on my LAN? I am using a Dell Poweredge server running W2K server with 3 hosts.

Peter
0
Comment
Question by:Peter_Fabri
  • 3
4 Comments
 
LVL 4

Expert Comment

by:pakitloss
ID: 12334764
Peter,

Please give some more information about your setup? What are you using for email? (ie.Exchange?) who hosts it?. Describe as musch as possible.

Pakitloss
0
 

Author Comment

by:Peter_Fabri
ID: 12336927
I am using Microsoft Exchange 2003. I recently registered a domain name and want to use my Exchange to send/receive e-mail using my domain as part of the e-mail address.

Peter
0
 
LVL 4

Accepted Solution

by:
pakitloss earned 125 total points
ID: 12338227
Peter,

To secure the outside against relaying it is usually typacal to have your users authenticate before they can send mail. Open Exchange Manager:

1)Expand "Servers"
2)Expand "thenameofyourserver" (ie.mail.com or mail)
3)Expand "Protocols"
4 Expand "SMTP"
5 Right click "default SMTP virtual server" and select "Properties"
6) Click on the "Access" tab and then the "Relay" button.
7) Be sure "Only the list below" is checked.
8) MOST IMPORTANTLY: Check the "Allow all computer which successfully authenticate to relay, regardless of the list above. This may look a little scary at first but the list above is an access list and the check box forces users to have to use a password to send mail. The password will be the same as the POP3 password if you are allowing mail from the outside. Exchange will take care of everything on the inside. If you are only sending mail from the inside then add your LAN address to the list (ie. 192.168.0.0 255.255.255.0) This can be done by clicking "Add" and selecting "Group of Computers".

Here is a great site for all things Exchange:
www.msexchange.org
and http://www.msexchange.org/tutorials/MF005.html which explains this subject in more detail.

Hope this helped Peter. If I missed your point please let me know.

Mike.
0
 
LVL 4

Expert Comment

by:pakitloss
ID: 12402052
Thanks Peter,

Glad to have been of help.

Take care,
 
Mike
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

I was recently sitting at a desk at work with one of my colleagues and needed some information on my home computer. He watched as I turned on my home computer, established a remote session into it, got the information I needed and then shut it down …
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now