Exchange 2003 - receiving bouceback messages - how do I block?  (kinda urgent)

Posted on 2007-10-03
Last Modified: 2010-03-06
Running Exchange 2003 standard service pack 2 fully patched.  One user sent a whole bunch of emails and now receives the following message (see below) about once every 5 minutes.  I had the user exit Outlook completely and use Outlook Web access.   The message below keeps arriving so I think I can confidently say it's a problem with Exchange and not Outlook.

I have run a spyware checker on the user's pc - no spyware.

What procedure do I use in Exchange to block messages like this ?  Please provide details as I am not an Exchange expert.

I am providing 500 points because this is an urgent issue.

======================== The message ================================
From: System Administrator

Sent: Wednesday, October 03, 2007 12:16 PM


Subject: Undeliverable: Wake Up & Smell the Planet Excerpts

Your message did not reach some or all of the intended recipients.

Subject: Wake Up & Smell the Planet Excerpts

Sent: 10/1/2007 2:07 PM

The following recipient(s) could not be reached: on 10/1/2007 9:27 PM

The message cannot be delivered due to a configuration error on the server. Please contact your Administrator.

< #5.3.0 X-Unix; 73>

Question by:donpick
    LVL 104

    Expert Comment

    You can't block those messages. Your server has to accept NDRs that are destined for your server. If you attempt to block the messages you will get your server blacklisted.
    The remote server has an error and they need to fix the messages.
    Have you contacted the remote site to inform them of the problem?


    Author Comment

    Sembee:  yes I have, no response.  Suggestions?  What do you do in cases like this?
    LVL 104

    Accepted Solution

    Did you call them, or just email?
    You don't really have many options, but to sweat it out. The message should time out after 48 hours.


    Author Comment

    I disabled the offending email address and created another.  This stopped the offending email.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Join & Write a Comment

    Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
    Granting full access permission allows users to access mailboxes present in their database. By giving full access permission one can open and read the content of any mailbox but cannot send emails from that mailbox.
    This Micro Tutorial will demonstrate the easy use of Gmail embedding images in your email so the recipient of your email can view them in context.
    how to add IIS SMTP to handle application/Scanner relays into office 365.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now