我的公司正在收到很多欺骗性电子邮件。 例如。 [email protected]收到来自[email protected]的包含恶意软件或不良链接的电子邮件。
我的域名mycompany.com有一个SPFlogging设置(我知道这是有效的)。 我们正在运行Microsoft Exchange 2013,因此我觉得只要SenderID -SpoofedDomainAction设置为“拒绝”,所有的邮件都应该stream畅地运行,任何包含虚假地址的邮件都应立即被拒绝。
我通过在PowerShell中键入以下内容来启用此设置:
Set-SenderIDConfig -SpoofedDomainAction拒绝
在此之后,我input
GET-SenderIDConfig
结果如下:
+========================+=========================================================================================+ | RunspaceId | 84d80932-a4e4-470e-a71d-35e88c0d3073 | +========================+=========================================================================================+ | SpoofedDomainAction | Reject | +------------------------+-----------------------------------------------------------------------------------------+ | TempErrorAction | StampStatus | +------------------------+-----------------------------------------------------------------------------------------+ | BypassedRecipients | {} | +------------------------+-----------------------------------------------------------------------------------------+ | BypassedSenderDomains | {} | +------------------------+-----------------------------------------------------------------------------------------+ | Name | SenderIdConfig | +------------------------+-----------------------------------------------------------------------------------------+ | Enabled | True | +------------------------+-----------------------------------------------------------------------------------------+ | ExternalMailEnabled | True | +------------------------+-----------------------------------------------------------------------------------------+ | InternalMailEnabled | False | +------------------------+-----------------------------------------------------------------------------------------+ | AdminDisplayName | | +------------------------+-----------------------------------------------------------------------------------------+ | ExchangeVersion | 0.1 (8.0.535.0) | +------------------------+-----------------------------------------------------------------------------------------+ | DistinguishedName | CN=SenderIdConfig,CN=Message Hygiene,CN=Transport Settings,CN=mydomain | +------------------------+-----------------------------------------------------------------------------------------+ | | Contracting,CN=Microsoft | +------------------------+-----------------------------------------------------------------------------------------+ | | Exchange,CN=Services,CN=Configuration,DC=internal,DC=mccoskers,DC=com,DC=au | +------------------------+-----------------------------------------------------------------------------------------+ | Identity | SenderIdConfig | +------------------------+-----------------------------------------------------------------------------------------+ | Guid | 6e0ea226-f298-4b33-8d15-f8981f3f65ac | +------------------------+-----------------------------------------------------------------------------------------+ | ObjectCategory | internal.mydomain.com/Configuration/Schema/ms-Exch-Message-Hygiene-Sender-ID-Config | +------------------------+-----------------------------------------------------------------------------------------+ | ObjectClass | {top, msExchAgent, msExchMessageHygieneSenderIDConfig} | +------------------------+-----------------------------------------------------------------------------------------+ | WhenChanged | 16/12/2015 3:42:45 PM | +------------------------+-----------------------------------------------------------------------------------------+ | WhenCreated | 19/03/2013 12:37:15 PM | +------------------------+-----------------------------------------------------------------------------------------+ | WhenChangedUTC | 16/12/2015 5:42:45 AM | +------------------------+-----------------------------------------------------------------------------------------+ | WhenCreatedUTC | 19/03/2013 2:37:15 AM | +------------------------+-----------------------------------------------------------------------------------------+ | OrganizationId | | +------------------------+-----------------------------------------------------------------------------------------+ | Id | SenderIdConfig | +------------------------+-----------------------------------------------------------------------------------------+ | OriginatingServer | MCC-FS2.internal.mydomain.com | +------------------------+-----------------------------------------------------------------------------------------+ | IsValid | True | +------------------------+-----------------------------------------------------------------------------------------+ | ObjectState | Unchanged | +========================+=========================================================================================+
重新启动传输服务之后,我去了http://www.anonymailer.net/并发送了一个欺骗性的电子邮件,但没有被拒绝,几分钟之内它就到达了我的收件箱。
还有什么我需要做的,以实现这个工作?
您是否真的试图从Exchange服务器为您自己的域执行SPF查找? 在某些configuration中(外部域也是您的内部Windows域的名称),您需要将SPFlogging添加到您的内部DNS区域,以便Exchange可以真正看到它。
尽pipe我可能会build议您部署第三方工具来进行过滤,因为如果没有Edge服务器,内置filter非常弱。 对于额外的Exchange和Windows许可证,您可以获得具有更多function和报告的第三方工具。
西蒙。