Disable Basic Auth on the receive connectors.
As for those other ports, I am not familiar with those for Exchange.
You could simply disable all the connectors you dont need as well.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Our company uses Qualys to detect vulnerabilities on servers. It recently found one for SMTP on our Exchange 2019 servers that says:
"Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 25 over TCP.Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 587 over TCP.Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 477 over TCP.Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 465 over TCP.Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 475 over TCP.Remote Management Service Accepting Unencrypted Credentials Detected (SMTP) detected on port 476 over TCP."
These all look like receive connector ports although I can't find any connectors that use ports 476 or 477.
Does anyone know if there is something I can change that would stop these connectors from receiving unencrypted credentials without impacting SMTP? I should also add that we are in hybrid mode and have no mailboxes on-prem.
Also, does anyone know what is using ports 476 and 477?
Thanks
Disable Basic Auth on the receive connectors.
As for those other ports, I am not familiar with those for Exchange.
You could simply disable all the connectors you dont need as well.