Solved

tracing E-Mail back to Client PC with Exchange Logs

Posted on 2014-12-02
3
256 Views
Last Modified: 2014-12-04
We have an old Exchange 2003 that did a lot of Mail-sending-without-boxes-through-software-stuff (SMTP without auth.). And shouldn't be doing it any more, but theres this one mailaddress that keeps sending e-mails through a wrong alias that gets rejected from exchange.
The Exchange ist still used for some other legacy stuff like public folders so we can't just decomission it.

So now i need to find out which piece of crapware on one computer in the network is responsible for this.
Sadly i can't seem to find the right screw that need tweeking in the exchange log-setting to tell me where the mail came from.
0
Comment
Question by:eSourceONE
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 40475557
You can use something like WireShark to sniff the network for port 25 traffic being sent to the server and then that should give you the sending IP address and that should identify the offending computer:

https://www.wireshark.org

Alan
0
 

Author Closing Comment

by:eSourceONE
ID: 40480397
Not quite the solution I had in mind but it did the trick.
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 40480414
As long as it worked and you found the culprit ;)

Thanks for the points.

Alan
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
In this video we show how to create an Address List in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Organization >> Ad…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question