Solved

Exchange SMTP Relay

Posted on 2013-01-10
3
268 Views
Last Modified: 2013-01-15
I have exchange 2010.
I need to find out all devices (printers,scanners,application, etc) which are using the relay

Is there a way to do this ?
0
Comment
Question by:Lidka
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 15

Expert Comment

by:Rajkumar-MCITP
ID: 38764710
Go to the properties of receive connector and in Network tab you can find all the IP address that are allowed to relay emails.

You will have 3rd Receive Connector, check over there
0
 
LVL 49

Expert Comment

by:Akhater
ID: 38764808
the only way to do it is to enable logging on your receive connectors and then parse these logs to know the IP addresses of the devices that have used these connectors
0
 
LVL 52

Accepted Solution

by:
Manpreet SIngh Khatra earned 500 total points
ID: 38765869
Just to add to above as said Enable Logging is also a good option until you have a Range or Open relay to understand for Application and Logs can then be filtered in Excel to understand the entire data

- Rancy
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question