Wednesday, March 25, 2009

Anti-Spam for Exchange Server 2007 with Hub Transport

Symptoms:
After Installing new Exchange 2007 server with Hub Transport, you realized it is not Anti-Spam Enabled. Many information and Best Practice only refer to Edge Transport. What if you don't have any budged to created Edge server or you only run small organization but must have Anti-Spam mechanism?

Solution:

Actually the Anti-Spam features can be installed directly into the Hub Transport module on the Exchange Server using Power Shell.
1. Run the Install-AntispamAgents.ps1 script. This script is located in the %system drive%/Program Files/Microsoft/Exchange Server/Scripts
2. Restart the Microsoft Exchange Transport service:
Restart-Service MSExchangeTransport
3. Specify the internal SMTP servers by using the InternalSMTPServers parameter on the Set-TransportConfig cmdlet
set-transportconfig –internalsmtpserver x.x.x.x
4. Check 'Server Configuration\Hub Transport', notice the 'Anti-spam Updates Enabled' set to 'True'. If it's not you need to run:
Enable-AntispamUpdates -SpamSignatureUpdatesEnabled $true -UpdateMode Automatic
5. Add quarantine mailbox for administrator to check, deleted, and send again (Approved) quarantined email
6. Do required configuration (SCL and custom configuration) for Anti-Spam features:
- Content Filtering
- IP Allow List
- IP Allow List Providers
- IP Block List
- IP Block List Providers
- Recipient Filtering
- Sender Filtering
- Sender ID
- Sender Reputation


More info: http://technet.microsoft.com/en-us/library/bb201691.aspx

Saturday, March 21, 2009

Exchange 2003 to new Exchange 2007 server sending failure

After introducing first Exchange Server 2007 server into an existing Exchange Server 2003 organization, you may encounter an mail flow issue between the two servers.

Symptoms:
- Emails sent from Exchange 2007 to Exchange 2003
- Emails not sent from Exchange 2003 to Exchange 2007 and might be seen in the queue of the Exchange 2003 server.

Solutions:
Remove the smart host from the Default SMTP Virtual Server and instead configure a new SMTP Connector for the Routing Group to send internet email (the namespace of “*”) to the smart host.

Thursday, March 12, 2009

Prevent the network adapter from detecting a link state

To prevent the network adapter from detecting a link state, follow these steps.

Note The NetBEUI protocol and the IPX protocol do not support Media Sensing.

1. Start Registry Editor.
2. Locate the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters

3. Add the following registry entry to the Parameters subkey:

Name: DisableDHCPMediaSense
Data type: REG_DWORD (Boolean)
Value: 1

Note This entry controls the behavior of Media Sensing. By default, Media Sensing events trigger a DHCP client to take an action. For example, when a connect event occurs, the client tries to obtain a lease. When a disconnect event occurs, the client may invalidate the interface and routes. If you set this value data to 1, DHCP clients and non-DHCP clients ignore Media Sensing events.

4. Restart the computer.

Note Microsoft Windows Server 2003 supports Media Sensing when it is used in a server cluster environment. By default, however, Media Sensing is disabled in a Windows Server 2003-based server cluster, and the DisableDHCPMediaSense registry entry has no effect. In Windows Server 2003 Service Pack 1 (SP1), the DisableClusSvcMediaSense registry entry was introduced. You can use this registry entry to enable Media Sensing on the Windows Server 2003-based nodes of a server cluster. The details of the DisableClusSvcMediaSense registry entry are as follows:

Key: HKEY_LOCAL_MACHINE\Cluster\Parameters
Name: DisableClusSvcMediaSense
Data type: REG_DWORD (Boolean)
Default value: 0

By default, the DisableClusSvcMediaSense entry is set to 0. When this entry is set to 0, Media Sensing is disabled. If you set the DisableClusSvcMediaSense entry to 1, you can use the DisableDHCPMediaSense entry to enable Media Sensing. This behavior matches the behavior of a Microsoft Windows 2000 Server cluster environment.

More info: http://support.microsoft.com/kb/239924/

Monday, March 2, 2009

Handling Exchange IMF & SCL

To enable IMF auto-updates:

1. In Registry Editor, navigate to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange

2. Create the following value (DWORD):

ContentFilterState

and give it a value of 1.


To configure IMF to also add the SCL rating to the archived message:

1. In Registry Editor, navigate to the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\ContentFilter

Note: You might not find this key in place. If that is the case, create a new key under the Exchange key and call it ContentFilter

2. Within the ContentFilter key, create the following value (REG_DWORD):

ArchiveSCL

and give it a value of 1.

restart the Simple Mail Transfer Protocol (SMTP) service