Solved

Exchange 2010:  Accepting mail to non-existent users

Posted on 2016-09-18
2
302 Views
Last Modified: 2016-09-18
Hi,

I have a client who is using a bit of a strange setup.  He receives mail directly via SMTP, it is first received by his sophos firewall SMTP proxy.  The firewall calls out mail that is received to verify if the user exists before accepting the message.  Messages are then scanned and forwarded to the mailsserver.

Mail is sent, however, via a smart host of a different provider.  
(Long story - it has to do with their line issuing fixed IPs from a DHCP pool, so they are not fit for running a mailserver on because sent mail will not be accepted by many providers).
This provider is then sending Mailer-Deamon replys to also non-existent senders (spammers) which results in blocking the account after a while.

How do I train exchange to tell the firewall that an address does not exist so that it is rejected before transmission?

To those who know Sophos:  The firewall is AD-member, but setting it to check for existing adresses in AD results in each and every mail being rejected because it does not exist even though it does.

Thanks,
Ralph
0
Comment
Question by:Ralph Scharping
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 41803619
If I understood correctly what you are looking for this is how to enable recipient filtering on exchange https://secure.efoldering.com/support/Knowledgebase/Article/View/78/23/configuring-recipient-verification-in-exchange-2007--exchange-2010
0
 
LVL 2

Author Closing Comment

by:Ralph Scharping
ID: 41803633
Just what I was looking for.  Thanks.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Read this checklist to learn more about the 15 things you should never include in an email signature.
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
This video demonstrates how to sync Microsoft Exchange Public Folders with smartphones using CodeTwo Exchange Sync and Exchange ActiveSync. To learn more about CodeTwo Exchange Sync and download the free trial, go to: http://www.codetwo.com/excha…
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question