Good evening,
Gone through quite possibly all online documents related to Exchange Receive Connectors so I feel as though I have a good understanding regarding the default connectors Exchange creates upon installation. Most articles seem to agree agree that leaving them alone is probably a better option (essentially just create new as needed). Based on my limited experience Exchange seems to do a pretty good job straight out of the box.
That said, here is my question(s)
If the goal of an environment is to completely lock down all mail relay to specific IP addresses based on requirements (internal and external ect), would the following 4 new Receive Connectors accomplish that goal? I have never heard of this being done before and definitely never seen it. Is it as straight forward as it sounds (examples below)?
1 Connector for Inbound mail flow locked down to the appliance IP addresses (essentially replacing the Default Frontend SERVERNAME connector.
1 Connector for internal relay marked for Anonymous (printers/applications/things like that) that require no username/password for authentication (locked down to IPs).
1 Connector for internal relay marked as Authenticated for devices/apps/ect that do require usernames/passwords for internal/external recipients (also locked to IPs).
1 Connector for Anonymous relay to external recipients only based on the following command (non accepted domains).
Add-ADPermission -User 'NT AUTHORITY\Anonymous Logon' -ExtendedRights MS-Exch-SMTP-Accept-Any-Recipient
Based on articles I have read, outside of adding Authentication types (TLS, Integrated Windows authentication, and Basic authentication) accordingly, does this work as expected? Definitely adding connectors that technically do not need to be since by default internal relay is already covered using the Default Frontend SERVERNAME. However, this would lock down all mail relay attempts if specific IP addresses were added to the appropriate scope would they not?
Thanks for any feedback you may have. Much appreciated.