Menu
  • Downloads
  • Knowledge Base
  • Documentation
  • Reputation
  • Email Security Tester
  • Downloads
  • Knowledge Base
  • Documentation
  • Reputation
  • Email Security Tester
home/Knowledge Base/Libraesva ESG/Dynamic Verification with Exchange 2013 and 2016
Popular searches:GDPR, ESG 5 migration guide, "How to configure Libraesva ESG for Microsoft 365"

Dynamic Verification with Exchange 2013 and 2016

2986 views 4 June 20, 2018 paolo

Print to PDF

PROBLEM

Starting with Exchange 2013, Microsoft have changed the behavior of the Exchange FrontEnd Transport service so that it no longer rejects invalid recipients after they are specified.  This is causing Libra ESVA Dynamic Verification check to fail. To restore it a few configuration steps are required on Exchange, to use the default HubTransport connector which is still SMTP compliant, and rejects invalid recipients after they are specified using the RCPT TO command.  By default the Default HubTransport connector is accessed on port 2525.

SOLUTION

This solution works only with Libra Esva version 4.4 and above.

  1. Check the Exchange Anti-Spam Agents on Exchange
  2. Enable the “Recipient Filtering Agent”
  3. Enable AddressBook
  4. Enable Recipient Validation
  5. Disable all the other Anti-Spam Agents (recommended)
  6. Allow access to the Default receive connector
  7. Configure Libra ESVA to use port 2525 for Dynamic Verification

 

1) Check the Exchange Anti-Spam Agents on Exchange

This can be checked via the Exchange Management Shell (EMS).  Open EMS.  Issue the following command:

Get-TransportAgent

Check to see if “Recipient Filter Agent” is listed. If “Recipient Filter Agent” is not listed, issue the following command to install the Exchange Anti-Spam Agents:

& $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1

2) Enable the “Recipient Filtering Agent”

After installing the Anti-Spam Agents issue the following command to verify that the Recipient Filter Agent has been installed and is enabled:

Get-TransportAgent

f it is not enabled run the following command to enable the Recipient Filtering Agent:

Enable-TransportAgent “Recipient Filter Agent”

NOTE: To apply these settings the “Microsoft Exchange Transport” service needs to be restarted.

3) Enable AddressBook

Cross check that your accepted domains are using Address Book to check for valid recipients. This should be already enabled by default. To check it, run this command:

Get-AcceptedDomain | Format-List Name,AddressBookEnabled

In case is disabled you can enable it with the command:

Set-AcceptedDomain <name of accepted domain> -AddressBookEnabled $true

NOTE: If you made any change here, remember that the “Microsoft Exchange Transport” service needs to be restarted again.

4) Enable Recipient Validation

Last configuration step is to cross check that Recipient Validation is enabled. To check if it is  disabled, run:

Get-RecipientFilterConfig | FL Enabled,RecipientValidationEnabled

It should return that Recipient Filter is enabled, but if validation is not run this command:

Set-RecipientFilterConfig -RecipientValidationEnabled $true

NOTE: If you made any change here, remember that the “Microsoft Exchange Transport” service needs to be restarted again.

5) Disable all the other Anti-Spam Agents (recommended)

It is recommended to disable all the other Anti-Spam Agents so that ONLY recipient verification is enabled.  This will prevent issues such as your Exchange server blocking the Libra Esva Quarantine Report (this report will contain a list of Subject lines from spam mails and may be blocked as spam by the Content Filter Agent):

Set-SenderFilterConfig -Enabled $false
Set-SenderIDConfig -Enabled $false
Set-ContentFilterConfig -Enabled $false
Set-SenderReputationConfig -Enabled $false

and then (each of the following lines require a confirmation):

Disable-TransportAgent "Sender Filter Agent"
Disable-TransportAgent "Sender ID Agent"
Disable-TransportAgent "Content Filter Agent"
Disable-TransportAgent "Protocol Analysis Agent"

NOTE: If you made any change here, remember that the “Microsoft Exchange Transport” service needs to be restarted again.

6) Allow access to the Default receive connector

Allow access to the Default receive connector

Now go to the Exchange Administrative Cente, go to Mail Flow -> Receive Connectors.  Edit your ”Default <servername>” connector’, go to the Security tab and ensure that Anonymous users are allowed.  This will allow connections to this Receive connector so it can be used for Dynamic Recipient Verification, but mail cannot be delivered directly via this connector.  By default this connector can be accessed on port 2525.

7) Configure Libra ESVA to use port 2525 for Dynamic Verification

In your Libra Esva go to menù System -> Mail Transport -> Relay Domains and edit the domain configuration. Set Dynamic Verification as Recipient Verification. Then set the Dynamic Verification Server and port (default 2525).

Now you are ready to go!

Was this helpful?

4 Yes  No
Related Articles
  • Troubleshooting Outlook Add-in Authentication with Microsoft 365
  • Libraesva AI usage: technical implementation, governance, privacy and regulatory compliance
  • ESG API
  • Cluster Firewall ports requirements for workers (distributed setup)
  • Encryption at rest
  • Distributed setup

Didn't find your answer? Contact Us

Popular Article
  • Encryption at rest
  • Protocol number
  • Migration process from UkCloud due to liquidation
  • Cluster Firewall ports requirements for workers (distributed setup)
  • Quarantine Reports are not sent after a migration
Tag Cloud
active content blacklist Cluster Alert Cluster Error delisting delivery disk performance email esva file sandbox gdpr hypervisor ip address memory usage monitoring monitring performance privacy production quarantine disk quicksand rbl reputation retention time sandbox sanitize document security snmp template testing tnef uri sandbox url rewrite url sandbox winmail.dat zabbix

  How to manage e-mails from quarantine report message?

Directory Based Edge Blocking (DBEB) feature from Office 365  

Products
  • Email Security Gateway
  • Email Archiving & Compliance
  • Phishing Awareness
Industry
  • SMB Companies
  • Large Companies
  • Education
  • MSP’s
Solutions
  • Microsoft 365
  • General Data Protection Regulation (GDPR)
  • Business Email Compromise
  • Migrate from Symantec
Resources
  • Email Security Tester
  • Company Website
  • Security Blog
  • Case Studies
  • Free Tech Webinars
Partners
  • Partner Portal
  • Become a Partner
  • Technology Alliances
Company
  • About Libraesva
  • Why Libraesva
  • News
  • Careers
  • Contact Us

LIBRAESVA SRL
Piazza Cermenati, 11
23900 Lecco - ITALY
VAT ID: 03442930131


LIBRAESVA LIMITED
Spaces, 83 Baker St
London W1U 6AG - United Kingdom
VAT ID: 274381685


LIBRAESVA INC
2608 2nd Ave, Suite 327
Seattle, WA 98121 - United States

  • (C) Libraesva 2024 - All rights reserved

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT

WordPress Download Manager

WordPress Download Manager - Best Download Management Plugin

Popular searches:GDPR, ESG 5 migration guide, "How to configure Libraesva ESG for Microsoft 365"