I have an Exchange 2013 server which was a victim of spam infiltration, and the exchange server was being used as an open relay for unauthorized users (and domains) to remotely send spam. I have done research and was unable to find any detailed tutorials on exactly how Frontend Receive connectors should be to prevent open relay.
My setup:
- Exchange Server 2013: One server that holds all exchange roles and mailboxes with a single database.
- A single static IP from Comcast: xx.xx.xxx.221
- Users: We want all domains outside of the Exchange organization on the internet to be able to send emails to us and receive it in our organization. We also want to be able to send emails to any domain as well.
- Using default connectors: We are using the default connectors created with the deployment of Exchange 2013. Anonymous users is turned on for authentication.
- The Exchange Server is a part of an active directory domain corp.example.com and users' email address will be alias@example.com.
What are the appropriate ranges to put so that my Exchange Server does not become an open relay server for spam? So far I have xx.xx.xxx.221-255.255.255.255, but I believe this may not be entirely right.
In addition, when I turn off Anonymous Users emails from outside the Exchange organization are not received by any users who have mailboxes within the organization. I assume anonymous users should remain off to prevent open relay, but I'm not sure why mail can't be received when requiring authentication.