ms-Exch-SMTP-Accept-Authoritative-Domain-Sender deny seems not to work on FrontendTransport connector

Dieter Tontsch (GMail) 972 Reputation points
2020-12-18T11:51:31.857+00:00

We run an Exchange 2016 op-prem. As our internet-faced SMTP Receive connector we use a FrontendTransport Connector. By some reason it looks like ms-Exch-SMTP-Accept-Authoritative-Domain-Sender Deny for Anonymous Logon seems to not apply. First I did remove AD permission by using this command:

Get-ReceiveConnector "Connector Name" | Get-ADPermission -user "NT AUTHORITY\Anonymous Logon" | where {$_.ExtendedRights -like "ms-Exch-SMTP-Accept-Authoritative-Domain-Sender"} | Remove-ADPermission

Then I even have explicitly denied permission via ADSI Edit security tab, but no success. Still mail from with a autoritative domain in Email Address can send emails through this connector. This is not true for a test connector of type Hub Transport.

Is this as designed? Do I need to create my internet smpt connector as a Hub Transport connector? What is the difference anyway?

Interesting is that I am pretty sure this worked in the past. I have configured that several years ago and from what I can remember ms-Exch-SMTP-Accept-Authoritative-Domain-Sender Deny for Anonymous Logon did work.

kind regards,

Dieter

Exchange | Exchange Server | Management
{count} votes

Accepted answer
  1. Andy David - MVP 157.8K Reputation points MVP Volunteer Moderator
    2021-01-05T15:18:58.7+00:00

    hi @Anonymous ,
    I checked with the Exchange Product Group and can confirm that ms-Exch-SMTP-Accept-Authoritative-Domain-Sender only works with Hub Connectors in 2016 and above. :(

    0 comments No comments

14 additional answers

Sort by: Most helpful
  1. Dieter Tontsch (GMail) 972 Reputation points
    2020-12-18T12:06:12.063+00:00

    Hi, the goal is that I am trying to avoid accepting spam emails which come like from our own addresses.
    So, on this connector no emails coming from like e.g. first.last@mathieu.company .com to either first.last@mathieu.company .com or to whatever @comapny.com. Because this is our only Exchange Server and no emails from any authoritative domain shall pass through it. We have another dedicated smtp connector which allows this for certain purposes like mailchimp etc.

    cheers

    0 comments No comments

  2. Andy David - MVP 157.8K Reputation points MVP Volunteer Moderator
    2020-12-18T12:28:59.973+00:00

    Ok, in that case, I wouldn't even mess with the receive connectors. :)
    Does your anti-spam/anti-phishing solution do this? I recommend setting there if it exists on a SMTP gateway that sits in front of Exchange.

    If not:

    Just create a transport rule. Example.
    Craft as you see fit:
    https://support.knowbe4.com/hc/en-us/articles/212679977-Domain-Spoof-Prevention-in-Exchange-2013-2016-Office-365

    This is far easier to maintain and you can provide a rejection message if you want or just drop the message.

    Alternatively, use anti-spam tools built into Exchange, though I typically do not recommend these as they are pretty basic and you really should run anti-spam/anti-phishing on a separate gateway :
    https://www.codetwo.com/admins-blog/how-to-prevent-internal-email-spoofing-in-exchange/

    0 comments No comments

  3. Dieter Tontsch (GMail) 972 Reputation points
    2020-12-18T15:28:05.417+00:00

    Ok, thanks for that hint. Well, this could valid approach, even though I'd rather have this ms-exch-smtp-accept-authoritative-domain-sender extended permission working on the connector. However, I have implemented a Transport Rule. For now I do forward emails for approval to check how reliable my configuration works.

    On our mail gateway this is a feature which requires additional licensing.

    But beside this, when I had a closer look to my Mail Flow Rule I figure that it seems to to work as expected.
    The problem is, that if one user who is connected via Outlook, but from the internet, and he sends an email obviously as an internal user to another internal user AND an external user, gmail or so, this email gets blocked for approval. We have tested this carefully and this is what always happen. It only happens if the user's outlook is connected through internet and as recipients there is a mix of at least one internal + one external user. If it is just like from usera@mathieu.company .com to userb@mathieu.company .com it goes through without additional approval. Any idea? If that works this way, it is of no use, since my users often do connect to outlook from internet via ssl/https. Am I missing something? I configured my rule according to this https://support.knowbe4.com/hc/en-us/articles/212679977-Domain-Spoof-Prevention-in-Exchange-2013-2016-Office-365

    See a screenshot attached:
    49572-spoof-rule.png

    Honestly I do not understand why sending an email from @mathieu.company .com to company.com AND gmail.com triggers this rule, and just sending from company.com to company.com doesn't.

    0 comments No comments

  4. Dieter Tontsch (GMail) 972 Reputation points
    2020-12-18T15:46:13.987+00:00

    In the email header of an Email sent via Outlook, but via Internet connection I see "X-Originating-IP" which is obviously a public IP. Is this eventually because of that considered to be "outside the organization"?


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.