Messaging Gateway

SMG: Block spoof sender using custom rule 

Jul 24, 2018 01:21 AM

I thought it would be good to share this, it's a workaround that I've created some time ago

 

Back story: In normal circumstances, no sender from own domain is expected from external

                   (Internet)

                  Emails from own domain should go internally between exchange and not outside

                   MTA/source.


                e.g  

                 Fake sender example.com (Internet) ---> SMG ---> Exchange ---> Mailbox (example.com)


                 Mailbox (example.com) ---> Exchange ---> Mailbox (example.com)



Objective: Block spoofed sender


Solution: We may use SMG content filtering


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Statistics
0 Favorited
8 Views
1 Files
0 Shares
4 Downloads
Attachment(s)
docx file
SMG block spoofed domains - revised.docx   436 KB   1 version
Uploaded - Feb 25, 2020

Tags and Keywords

Comments

Jul 25, 2018 06:08 AM

Yes, this is good info. I think there is an article for smg on: using smg and office 365 that uses another way as well to do this. I am keeping this for sure.

Jul 25, 2018 03:14 AM

Hi
Thanks for sharing your solution.
We use the built in bad sender domain list wich triggers on both 5321.from and 5322.from but could be done in content rule too.
Tnx Thomas

Related Entries and Links

No Related Resource entered.