The administration of a hybrid deployment that connects on-premises Exchange Server with Exchange Online, enabling seamless integration and centralized control.
Hi @Checior200
Thank you for sharing your concerns regarding the Default Frontend Receive Connector in your Exchange hybrid environment.
You could refer to AI's suggestion first. As far as I know, on Mailbox servers the Default Frontend <ServerName> Receive Connector listens on TCP port 25, accepts anonymous inbound SMTP connections, and is designed to receive mail from the internet (when MX records point to on‑premises), from other on‑premises Exchange servers, and from Exchange Online in hybrid scenarios, depending on the configured routing.
After accepting the SMTP connection, the connector hands messages off to the Transport service for further processing. Allowing anonymous SMTP connections that can deliver messages to internal recipients is by design and does not in itself make the server an open relay, as Exchange enforces strict internal anti‑relay controls to prevent unauthorized message forwarding.
Regarding your concerns:
For limiting the Remote IP scope of the Default Frontend Receive Connector to only on‑premises Mailbox server IPs
I would not recommend this approach, and it is not considered safe in a hybrid environment.
If the Remote IP ranges are restricted to only on‑premises Mailbox server IPs, mail originating from Exchange Online (via Exchange Online Protection) might be blocked. This is because Exchange Online delivers inbound hybrid mail from Microsoft‑owned EOP IP ranges, not from internal Exchange server IP addresses.
Could restricting this connector break hybrid mail flow, and which IP scope should be configured if restriction is required?
Restricting the connector to only on‑premises IP addresses might break your hybrid mail flow from Exchange Online to on‑premises Exchange.
In scenarios where the connector must be restricted, the Remote IP scope would need to include the following:
The IP addresses of all on‑premises Exchange Mailbox servers.
All Exchange Online Protection (EOP) outbound IP ranges used to deliver mail to on‑premises environments
These Microsoft IP ranges are relatively large and can change over time, making manual maintenance error‑prone and operationally risky.
Microsoft‑recommended best practices for securing this connector in a hybrid environment without Edge servers
As my research, you could consider to the following approach:
You should not modify the Default Frontend Receive Connector (leave Remote IP Ranges as “All” and Anonymous authentication enabled). The Hybrid Configuration Wizard (HCW) already configures the necessary TLS settings on this connector for secure hybrid mail flow.
Secure at the firewall level: Block inbound TCP port 25 from the public internet.
Allow inbound TCP port 25 only from the official Exchange Online Protection IP ranges (published in the Microsoft 365 URLs and IP address ranges document).
For any internal applications, scanners, or printers that need to send/relay email anonymously, create a separate custom Receive Connector (on the Frontend Transport role) with a very narrow Remote IP scope limited to those specific devices only. Never use the default connector for this.
I have found some relevant articles that might help, you could refer via:
Receive connectors | Microsoft Learn
Set up the Built-in security add-on for on-premises mailboxes
Scenarios for custom Receive connectors in Exchange Server
Please note that this summary is based on my own findings and may not fully address your concerns. To help you reach your goal more effectively, I recommend engaging with [GitHub Community Forum] for a deeper technical dive or to connect with individuals who have relevant experience and expertise. Some approaches may behave differently or be restricted depending on your specific environment and configuration. These forums include many experienced developers and Microsoft specialists who can assist with troubleshooting and guidance.
Apologies for redirecting you to the related development team support. As moderators in this community, we do not have access to your specific tenant configuration, and my testing environment is limited. Therefore, my guidance is based on available Microsoft documentation and resources. That said, I’ll do my best to provide additional insight where possible.
I hope this helps.
If you have any additional concerns, feel free to comment below. I would be more than happy to assist.
Note: Please follow the steps in [our documentation] to enable e-mail notifications if you want to receive the related email notification for this thread.