Solved

Exchange 2010 open relay question

Posted on 2011-09-26
9
240 Views
Last Modified: 2012-05-12
If I run this command to make sure there is no open relay on my exchange 2010 server, do i have to run it for all receive connectors or just the default?
There are 4 other rec connectors setup also.

Get-ReceiveConnector “ReceiveConnectorName” | Remove-ADPermission -User “NT AUTHORITY\ANONYMOUS LOGON” -ExtendedRights “ms-Exch-SMTP-Accept-Any-Recipient”

Don’t forget to replace ReceiveConnectorName with the name of your own receive connector.



0
Comment
Question by:vmich
  • 4
  • 3
  • 2
9 Comments
 
LVL 12

Accepted Solution

by:
serchlop earned 500 total points
ID: 36600574
You need to run this command for every receive connector you want To Close An Open Relay

You can verify that your server don't have open relay with many web pages.
http://www.mxtoolbox.com/diagnostic.apsx
http://www.checkor.com/
0
 
LVL 12

Expert Comment

by:Deepu Chowdary
ID: 36600583
Yu need to run for all rcv connectors
0
 

Author Comment

by:vmich
ID: 36600633
Is there anyway that I can check each connector since there are 6 total, to make sure they are not configured as an open replay with some permissions or some other setting on each connector via the EMC?
0
 
LVL 12

Expert Comment

by:serchlop
ID: 36600819
You can use telnet to verify it

http://www.burgers-online.com/?p=396
0
Do email signature updates give you a headache?

Constantly trying to correctly format email signatures? Spending all of your time at every user’s desk to make updates? Want high-quality HTML signatures on all devices, including on mobiles and Macs? Then, let Exclaimer solve all your email signature problems today!

 

Author Comment

by:vmich
ID: 36600845
The exchange server I am working on is 2010. Does the same apply for 2010 as 2007 or is it different?
0
 
LVL 12

Expert Comment

by:serchlop
ID: 36601012
Yes, it should be t he same.

Here is a MS doc to test exchange 2010 with telnet.
http://technet.microsoft.com/es-es/library/bb123686.aspx

0
 

Author Comment

by:vmich
ID: 36601020
Uh, that doc is in spanish I think...
0
 
LVL 12

Expert Comment

by:Deepu Chowdary
ID: 36601626
Use translate button on the top..
0
 

Author Closing Comment

by:vmich
ID: 36896573
solved
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Check out this infographic on what you need to make a good email signature that will work perfectly for your organization.
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
This video discusses moving either the default database or any database to a new volume.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now