The November 2018 release of the free GroupWise Resource Archive, which provides easy research of the NGW Digest email discussions between GroupWise administrators, partners, and consultants, is now available. Use the high speed text search capabilities to discover invaluable guidance within topics ranging from GroupWise technical issues to Micro Focus/Novell business discussions. The GroupWise Resource Archive can be …
I wonder if there is any Message Labs gurus out there taht can give me some advise:
We recently moved over to 365 email system and ever since any of our previous senders on message labs are getting bounce back messages with an error
Your message wasn’t delivered due to a permission or security issue. It may have been rejected by a moderator, the address may only accept e-mail from certain senders, or another restriction may be preventing delivery.
The #< #5.7.1 smtp; 550 5.7.1 <>… Relaying denied> #SMTP#
any help would be apprecated
Symantec Messaging Gateway: Current software version: 10.6.6-5.
Time range: Past day, gives a lot of errors that DNS TXT query for “<ip>.zodiac.brightmail.com” failed unexpectedly.
I think these errors started after changing suspected spam score and after enabling Third Party Senders. Now I have reverted all these settings, but still errors appear. I have already rebooted all my scanners, but no luck.
Our Nagios monitoring reports that our MX scanners SMTP check is CRITICAL – Socket timeout after 10 seconds (flipping between ok and critical). Also, if using online SMTP Test Email Server (https://mxtoolbox.com/SuperTool.aspx) it says SMTP Transaction Time: 7.023 seconds – Warning on Transaction Time.
1. In Spam > Scan Settings the URL repuration filtering is disabled. https://support.symantec.com/en_US/article.TECH234… (solution)
2. DNS servers in scanner settings are also correct. https://support.symantec.com/en_US/article.HOWTO44… (resolution 1)
3. Administration > Hosts > Utilities > Nslookup tool for example “172.19.227.43.zodiac.brightmail.com” (https://support.symantec.com/en_US/article.HOWTO44… (resolution 2).
Output: Cannot execute nslookup.
Server: 127.0.0.1 Address: 127.0.0.1#53 ** server can’t find 172.19.227.43.zodiac.brightmail.com: NXDOMAIN
$ nslookup -type=TXT 172.19.227.43.zodiac.brightmail.com
** server can’t find 172.19.227.43.zodiac.brightmail.com: NXDOMAIN
Also, if using MXtoobox (https://mxtoolbox.com/SuperTool.aspx) TXT Lookup: txt:172.19.227.43.zodiac.brightmail.com: DNS Record Published DNS Record not found.
I am runing out of ideas, any ideas or how to solve this problem?
If spoofed email that appears to be from your domain is not blocked via SPF, for various reasons you can create a Message Header filter to block them:
1) In the System Administration web page, go to Organization/Policy Management | Policy scan configuration | <Policy Name>
2) Add ‘Message Text” to your work bench, by dragging it down from ‘Filter Templates’ to ‘Deployment workbench’. Click on the name to rename it to Message header.
3) Click on the Icon to edit it, then do the following:
a) Check the box next to ‘Look in message header’.
b) In the ‘Search criteria’ type the following: From:*yourdomain.com
c) Click ‘OK’ and save the changes (blue disk on top right corner)
NOTE: If you already have a ‘message text’ component, you can add this to it. Just be sure that the ‘Look in the message header’ option is checked.
4) Link ‘Message Block’ and ‘Quarantine’ to the ‘Message header’ component, by dragging the orange circle for each to the ‘message header’ component. Save changes again.
5) Make sure you aren’t scanning this event on outbound email, otherwise all your outbound email will get blocked.
6) If you have any source address exceptions for your domain, make sure to link them to this Message Header component.