Solved

Ms Exchange 2010 - Symantec Mail SEcurity 7.5 - RBL

Posted on 2014-09-28
3
508 Views
Last Modified: 2015-01-19
Anyone know where to set RBL in Symantec Mail Security for Exchange version 7.5.0.56
0
Comment
Question by:edc-edctech
  • 2
3 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
For info - Heuristic Detection and Real-time Blacklist are no longer available as AntiSpam options after installing Symantec Mail Security for Microsoft Exchange (SMSMSE) on Exchange Server 2007/2010. The Real-time Blacklist feature is available with SMSMSE on Exchange 2000/2003.

http://www.symantec.com/business/support/index?page=content&id=TECH88712

but specific to Exchange RBL setting, you can check this

http://technet.microsoft.com/en-us/library/dd351199.aspx

Examples of commands to add RBL's via the Exchange Management Shell:
Add-IPBlockListProvider -Name bl.spamcop.net -LookupDomain bl.spamcop.net -Enabled $True -RejectionResponse "{1.EN_US} has blocked your IP address ({0.EN_US}) using the list '{2.EN_US}'. Please see http://www.spamcop.net/w3m?action=checkblock&ip={0.EN_US} for more information. This organization has no control over this RBL (Realtime Block List)."
Add-IPBlockListProvider -Name dnsbl.sorbs.net -LookupDomain dnsbl.sorbs.net -Enabled $True -RejectionResponse "{1.EN_US} has blocked your IP address ({0.EN_US}) using the list '{2.EN_US}'. Please see http://www.au.sorbs.net/lookup.shtml for more information. This organization has no control over this RBL (Realtime Block List)."
Add-IPBlockListProvider -Name zen.spamhaus.org -LookupDomain zen.spamhaus.org -Enabled $True -RejectionResponse "{1.EN_US} has blocked your IP address ({0.EN_US}) using the list '{2.EN_US}'. Please see http://www.spamhaus.org/query/bl?ip={0.EN_US} for more information. This organization has no control over this RBL (Realtime Block List)."
0
 

Author Comment

by:edc-edctech
Comment Utility
I've requested that this question be deleted for the following reason:

No solution found service was abandoned
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
strange that you requested to delete and selected the reply. do consider more specific what you will like to look into if the reply has not assisted in any way. thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

When you send traffic on the network or on wireless it may be in plain text and it may reveal all your passwords and details.  Most programs do not use encryption by default. This is acceptable if you own every device on the network and are sure …
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this Experts Exchange video Micro Tutorial, I'm going to show how small business owners who use Google Apps can save money by setting up what is called a catch-all email address in their Gmail accounts. By using the catch-all feature, small busin…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now