Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


e-mail authentication

Posted on 2004-10-17
Medium Priority
Last Modified: 2010-04-10
How do I go about securing e-mail authentication on my LAN? I am using a Dell Poweredge server running W2K server with 3 hosts.

Question by:Peter_Fabri
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3

Expert Comment

ID: 12334764

Please give some more information about your setup? What are you using for email? (ie.Exchange?) who hosts it?. Describe as musch as possible.


Author Comment

ID: 12336927
I am using Microsoft Exchange 2003. I recently registered a domain name and want to use my Exchange to send/receive e-mail using my domain as part of the e-mail address.


Accepted Solution

pakitloss earned 375 total points
ID: 12338227

To secure the outside against relaying it is usually typacal to have your users authenticate before they can send mail. Open Exchange Manager:

1)Expand "Servers"
2)Expand "thenameofyourserver" ( or mail)
3)Expand "Protocols"
4 Expand "SMTP"
5 Right click "default SMTP virtual server" and select "Properties"
6) Click on the "Access" tab and then the "Relay" button.
7) Be sure "Only the list below" is checked.
8) MOST IMPORTANTLY: Check the "Allow all computer which successfully authenticate to relay, regardless of the list above. This may look a little scary at first but the list above is an access list and the check box forces users to have to use a password to send mail. The password will be the same as the POP3 password if you are allowing mail from the outside. Exchange will take care of everything on the inside. If you are only sending mail from the inside then add your LAN address to the list (ie. This can be done by clicking "Add" and selecting "Group of Computers".

Here is a great site for all things Exchange:
and which explains this subject in more detail.

Hope this helped Peter. If I missed your point please let me know.


Expert Comment

ID: 12402052
Thanks Peter,

Glad to have been of help.

Take care,

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question