Solved

Sophos UTM email gateway to Office 365

Posted on 2016-10-11
2
37 Views
Last Modified: 2016-10-30
Hi,

All my email infrastructure is based on Office 365.
One NVR recorder item can not send email to Office 365 or Gmail.

Can I configure my UTM as a email gateway from my LAN NVR  to UTM and to office 365 email accounts?

How to do  this?

Regards
0
Comment
Question by:heze54
  • 2
2 Comments
 
LVL 36

Accepted Solution

by:
Jian An Lim earned 500 total points (awarded by participants)
ID: 41839212
if your NVR can't send email to Office 365/gmail, are you sure your UTM will solve the problem?

First thing i will want to make sure is your NVR has access to DNS, so it can query a domain.

As long as your from address is <user>@<your own domain> to <user2>@<your own domain>
you can send the email to <contoso-com>.mail.protection.outlook.com

If you have a static IP, you can configure SPF for better capture of emails.



for more info, READ direct send option
https://technet.microsoft.com/en-us/library/dn554323%28v=exchg.150%29.aspx?f=255&MSPPError=-2147217396 


You don't really need to configure UTM as email gateway.
0
 
LVL 36

Expert Comment

by:Jian An Lim
ID: 41865735
provided the answer as such
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
New firewall implementation guidance 12 57
Exchange 2010 SP1 to SP3 + RU16 8 37
Exchange 2010 RU 16 5 25
Outlook 2016 Email address in memory 6 23
Microsoft Office Picture Manager was included in Office 2003, 2007, and 2010, but not in Office 2013. Users had hopes that it would be in Office 2016/Office 365, but it is not. Fortunately, the same zero-cost technique that works to install it with …
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now