Solved

Email Spoofing

Posted on 2016-08-24
3
70 Views
Last Modified: 2016-08-25
I am curious as to what is the best practice/option to handle email spoofing? I have read a good deal but can't seem to find what works best.
0
Comment
Question by:ConyersIT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 95

Expert Comment

by:John Hurst
ID: 41769463
Somebody gets your email address (easy) and sends out emails under your name and email address. That is the spoofing part in a nutshell. It is not more complicated than this.

Answer to spoofing: Top notch spam filters stop it. I do this.
0
 
LVL 1

Accepted Solution

by:
2Gloves earned 500 total points
ID: 41769467
What type of spoofing are you experiencing? There are a few different scenarios. One being when an external sender spoofs a contact internal to your exchange domain specifically by spoofing the display name. This can be identified by viewing the sender address in the emails Header. If your address book recognizes the Display Name as one from an internal contact, it may not show the email address after the display name. Typically, only external contacts display the email address after display name and by spoofing the display name it prevents Outlook (for example) from showing the external email address as well.

Transport Rules can be created on the Exchange Server to help with this type of spoofing. See link for high level explanation and examples.
http://markgossa.blogspot.com/2016/01/spoofed-email-display-name-exchange-2016.html

If you are experiencing a alternate spoofing technique please provide further detail.
0
 
LVL 1

Author Comment

by:ConyersIT
ID: 41770037
Yes, it is external spoofing that is occurring. Thanks for the article.
1

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
how to add IIS SMTP to handle application/Scanner relays into office 365.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question