Disable "mailhost@" and "mailboxes@" in DNS

Posted on 2005-05-17
Last Modified: 2010-04-19
I have DNS set up on my Microsoft Small Business Server 2003.

In the last two days I am getting spam to "mailhost@" and "mailboxes@", which is being distributed somehow to multiple mailboxes.

How can I stop this?
Question by:PhillipBurton
    LVL 5

    Accepted Solution

    Go into the exchange service manager
    Global settings
    Message delivery - right click and properties
    Click on the recipient filtering tab
    This blocks emails addressed to the recipients specified
    Click Add and fill in the email addresses that you dont want incomming mail sent to.
    LVL 5

    Expert Comment

    You will have to enable sender/recipient filtering on your default SMTP server.
    If you need help with this let me know
    LVL 5

    Author Comment

    Deay KevNet,

    I have the following dialog box, which I presume is what your second comment refers:

    "Connection, Recipient, and Sender Filtering must manually be enabled on specific SMTP virtual server IP address assignments as they are not enabled by default. For more information on how to enable any of the above filtering types, read their associated help."

    (Which is a not very helpful second sentence!)

    You've certainly got some points already, but why does that lot mean?
    LVL 5

    Expert Comment

    In exchange system manager

    Default SMTP server - right click and properties

    On the general tab next to IP address click advanced
    Select the IP address in use and click edit
    Tick the box for apply recipient filter you can also click apply sender filter whilst your at it as you may want to use this later to block known SPAM domains.
    LVL 5

    Author Comment

    The three boxes are already ticked!
    LVL 5

    Expert Comment

    Are you still receiving mails from the specified domains after applying these settings??

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Preface Having the need * to contact many different companies with different infrastructures * do remote maintenance in their network required us to implement a more flexible routing solution. As RAS, PPTP, L2TP and VPN Client connections are no…
    A quick step-by-step overview of installing and configuring Carbonite Server Backup.
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now