Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Mail Relay on Exchange 2000 Sp3 Problem

Posted on 2004-10-22
8
Medium Priority
?
243 Views
Last Modified: 2011-09-20
Hi,

I am running exchange 2000 sp3 and i have people who connect and try and send mail spam out. they are attempting to use me as a relay. i read an earier article on locking  it down and only letting people who authenticate to send. The people who don't authenitcate's mail gets sent to the bad mail folder and stay in the queue?

When i check the sessions, i still see a number of people connected and do no understand why. is there a way to block them from connecting at all, even if the mail is just going to the badmail folder? this is using resources on my server.

i have esm....smtp....prop....relay....."allow only computers which successfully authenicate to relay" check marked.

If you look under esm.....prop....access control.....anonmous is checked. it is my understanding that this has to be check to allow mail from the outside in.

PLEASE HELP!

SOB
0
Comment
Question by:sob33316
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
8 Comments
 
LVL 3

Expert Comment

by:frieked
ID: 12382767
Uncheck that box.  Problem solved.  By checking that box you are in effect allowing anyone to relay off of your server.
Also, on the same properties page:
Make sure "Select which computers may relay through this virtial server"
"Only the list below" is selected and the list should be empty unless you have trusted mail servers who relay through you.
0
 

Author Comment

by:sob33316
ID: 12382800
uncheck which box?
0
 
LVL 3

Expert Comment

by:frieked
ID: 12382830
Uncheck "allow only computers which successfully authenicate to relay"
You most likely don't want anyone relaying off of your mail server, do you?
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:sob33316
ID: 12383018
i will test that tonight. i am assuming that email will still be able to be sent outside of my network then.
0
 
LVL 3

Accepted Solution

by:
frieked earned 1600 total points
ID: 12383154
Yes, your email will still work.
See this link for the basics of email relaying:
http://www.menandmice.com/9000/9221_mail_relay.html
0
 

Author Comment

by:sob33316
ID: 12385980
that didn't work...but under ESM......smtp....access......connection control......."all except the list below" is highlighted. i am going to assume that is another thing that is allowing everyone in....... do i need to put to the "only the list below" and then add something ?
0
 

Author Comment

by:sob33316
ID: 12390009
when i uncheck that box, i can send but i can't receive.
0
 

Author Comment

by:sob33316
ID: 12399244
problem is solved......thank you for your help!
0

Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What we learned in Webroot's webinar on multi-vector protection.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question