programming4us
         
 
 
Applications Server

Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 2)

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
7/23/2013 3:02:48 AM

3. Configuring an IP Block List Providers Using the Exchange Management Console

The IP Block List Providers is configured in the same manner as the IP Allow List Providers filter; however, two different options are available in the IP Block List Providers properties that are not available when configuring an IP Allow List Provider.

The first difference can be found in the Add IP Block List Providers window when adding an IP Block List Providers on the Providers tab. A custom message can be specified or the default can be used for the Determine Error Message Returned when a Sender Is Blocked by a Provider option in the Return Status Codes section. To configure a custom error message, click the Error Messages button at the bottom of the window and select Custom Error Message in the IP Block List Providers Error Message window.

Note

A maximum of 240 characters can be entered into the Custom Error Message field.


The second difference between the IP Allow List Providers and IP Block List Providers filters is the ability to add exceptions. Exceptions to the IP Block List Provider’s database can be configured on the Exceptions tab of the IP Block List Providers Properties window. On the Exceptions tab, you can add email addresses of senders that should not be blocked in the Do Not Block Messages Sent to the Following E-Mail Addresses, Regardless of Provider Feedback field. Messages sent to addresses in this list will not be blocked if they trigger a match in the IP Block List Providers’ database.

Note

You must first obtain the necessary DNS zone(s) or IP address(es) to query from the provider hosting the IP Block List being added.


4. Configuring IP Block and Allow Lists Using the Exchange Management Shell

Connection filtering can also be configured through the Exchange Management Shell. Each shell command has its own parameters you can set based on the action(s) performed by the command. There are four commands: Get, Add, Remove, and Set. Each command works with one or more IP Block and Allow List components.

The Get- command is used to retrieve the configuration of a component. For example, entering Get-IPBlockListConfig displays the IP Block List Configuration on the local system.

The Add- command can be used to add an IP Block or Allow List entry or list provider and to assign an expiration time to the entry. The following example adds an IP range to the block list with an expiration date and time (24-hour format).

Add-IPBlockListEntry -IPRange 192.168.1.1/16 -ExpirationTime 12/15/2007 11:30:00


					  

The Remove- command can be used to remove an IP Block or Allow List entry, list provider, or list entry. The following example removes a list provider using the name.

Remove-IPAllowListProvider -Identity Spamhaus

Note

Only static list entries can be removed using this command.


The Set- command allows an administrator to enable or disable the agent or modify the configuration of an IP Block or Allow List or list provider’s configuration. The following example enables the Connection Filtering Agent on email distributed internally.

Set-IPBlockListConfig -InternalMailEnabled $true

Note

The status of an IP Allow or Block List Providers can be tested using the Test-IPAllowListProvider or Test-IPBlockListProvider commands, respectively.


You can test the configuration of a Block or Allow List Providers using the Test-BlockListProvider and Test-AllowListProvider Exchange shell commands, respectively. The following example tests a Block List Provider on a remote server using the provider name.

Test-IPBlockListProvider -Identity Spamhaus -Server EDGE2

5. Configuring Sender Filtering

Sender filtering allows an administrator to block email messages received from specific email addresses, domains, and subdomains. Email that is routed through Receive Connectors is processed by the Sender Filtering Agent. These messages are received from the Internet and travel inbound to the Edge Transport server for delivery to the recipient. Sender filtering, for example, can be a very useful tool when someone in an organization is being harassed by an external person or ex-employee, receiving consistent nondeliverable receipts (NDRs) or strange messages from the same source because of a virus or spam.

Note

Changes described in this section are applied only to the local system. This is important if you have more than one Edge Transport server in your environment.


The Sender Filtering Agent is enabled by default and can be configured using the Exchange Management Console or Exchange Management Shell.

To disable the Sender Filtering Agent using the Exchange Management Console, right-click the agent icon in the action pane and select Disable. To disable the Sender Filtering Agent using the Exchange Management Shell, run the setSenderFilterConfig command with the -Enabled $false parameter, for example set-SenderFilterConfig -Enabled $false.

The General tab of the Agent Properties window displays a brief description of the agent and its capabilities, its current status, and the last time the agent’s settings were modified.

To add email addresses to the Sender Filtering list, double-click the Sender Filtering Agent in the action pane and select the Blocked Senders tab. From here, you can add, edit, or delete entries in the list. Checking the box at the bottom of the window enables the Block Messages from Blank Senders option. If an email address isn’t specified in the message received, it will be blocked. This is a fairly common trick used in spamming messages.

Click Add in the Add Blocked Senders window to do the following:

1.
Add an individual email address to block.

2.
Add a domain and subdomains (if applicable) to block.

Note

Limited wildcard usage is supported in these fields, specifically the asterisk (*). For example, you can add *@companyabc.com to the Individual E-Mail Address to Block field; however, it accomplishes the same result as adding companyabc.com to the Domain field. It is recommended to add the full email address to block.


The Action tab allows you to specify whether to reject or stamp messages with Block Sender and continue processing them if the address matches an entry in the list. Stamping the message updates the metadata to indicate the sender was on the block list. This is taken into account by the content filter when it tabulates an SCL. The Sender Reputation filter agent uses the SCL rating when developing a sender reputation level.

Other -----------------
- Implementing Edge Services for an Exchange Server 2007 Environment : Installing and Configuring the Edge Transport Server Components
- Exchange Server 2010 : Managing Web and Mobile Access (part 4) - Configuring URLs and Authentication for OWA, Configuring URLs and Authentication for Exchange ActiveSync, Configuring URLs and Authenti
- Exchange Server 2010 : Managing Web and Mobile Access (part 3) - Throttling Client Access, Configuring URLs and Authentication for the OAB
- Exchange Server 2010 : Managing Web and Mobile Access (part 2) - Enabling SSL on Web Sites, Controlling Access to the HTTP Server
- Exchange Server 2010 : Managing Web and Mobile Access (part 1) - Enabling and Disabling Outlook Web App Features, Configuring Ports, IP Addresses, and Host Names Used by Web Sites
- Active Directory 2008 : Managing Security Settings (part 2) - The Security Configuration Wizard
- Active Directory 2008 : Managing Security Settings (part 1) - Configuring the Local Security Policy, Managing Security Configuration with Security Templates
- Active Directory 2008 : Delegating the Support of Computers (part 2) - Delegating Administration Using Restricted Groups Policies with the Members Of This Group Setting
- Active Directory 2008 : Delegating the Support of Computers (part 1) - Understanding Restricted Groups Policies
- SharePoint 2010 : Virtual Machine Setup and SharePoint Configuration (part 3) - Security for the Services Dedicated to BI
- SharePoint 2010 : Virtual Machine Setup and SharePoint Configuration (part 2) - Set Up Your Own VMs on Windows 2008 R2
- SharePoint 2010 : Virtual Machine Setup and SharePoint Configuration (part 1) - Set Up a Pre-configured VM
- BizTalk Server 2010 : WCF SAP Adapter RFCs and BAPIs - Schema generation
- BizTalk Server 2010 : WCF SAP Adapter RFCs and BAPIs - Overview of SAP RFCs and BAPIs
- Exchange Server 2010 Administration Essentials : Understanding Exchange Server 2010 Organizations (part 2) - Using Configuration Containers Instead of Administrative Groups
- Exchange Server 2010 Administration Essentials : Understanding Exchange Server 2010 Organizations (part 1) - How Site-Based Routing Works
- Exchange Server 2010 Administration Essentials : Validating the Exchange Server Licensing
- Installing Configuration Manager 2007 : ConfigMgr Service Manager
- Installing Configuration Manager 2007 : Transfer Site Settings Wizard, Copy Packages Wizard
- Microsoft Dynamic AX 2009 : The Batch Framework (part 6) - Managing the Batch Server Execution Process - Manage Batch Jobs, Debug a Batch Task
 
 
Youtube channel
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS