SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Page 1 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
Send mail to Exchange Online using
standard SMTP session | Part 2#4
In the current article, we will review the process in which we want to enable a mail
client such as Printer or application to send an E-mail message via the Exchange
Online server. As mentioned in the former article – Send mail to Exchange Online |
Part 1#4, we can address the Office 365 mail services using one of the following
options:
 Option 1 – creating a secure communication link between the mail client and
the EOP server who is based on the mandatory requirement for encryption
and authentication by the mail client.
 Option 2 – creating a “non-secure” communication link between the mail
client and the EOP server in which the mail client is not required to provide
user credentials (anonymous) and the connection is based on the SMTP
protocol (non-encrypted communication link).
The option that we will review in the current article is – “option 2″.
Page 2 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the next article (SMTP Relay in Office 365 environment | Part 3#4), we will review
“option 1” – using a secure communication link to EOP using SMTP mail relay.
Send mail to Exchange Online – Article Series
 Send mail to Exchange Online | Part 1#4
 Send mail to Exchange Online using standard SMTP session | Part 2#4
 SMTP Relay in Office 365 environment | Part 3#4
 SMTP Relay in Office 365 environment | Troubleshooting scenarios |Part 4#4
When we want to use the option of – non-secure” communication link to Exchange
Online mail server, the process is quite simple.
The main tasks that we have are:
1. Get the host name of the Exchange Online server (EOP) that represents our
public domain name.
2. Configure the mail client to connect the Exchange Online server using the host
name
3. Create connection filter rule or Exchange Online rule (transport rule) that will
prevent the scenario in which Exchange Online will identify the E-mail as spam
mail.
Get the host name of the Exchange Online server who
represents our domain in Office 365.
Page 3 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
There are a two ways that we can use to get information about the FQDN (Fully
Qualified Domain Name) of the Exchange Online that “send E-mail for our domain”
Option 1: Office 365 administrate portal.
 Login on to Office 365 portal as global administrator
 On the left sidebar – choose the domain
 Choose – Manage DNS
Under the Exchange Online section, look for information about the MX record
hostname (POINTS TO ADDRESS). In our scenario, the Exchange Online server who
will “represent” our organization is: o365info-com.mail.protection.outlook.com
Option 2: using the nslookup tool.
Another option for getting information about the “Host name” of the Exchange
Online mail server that “represent” our organization is: by using the nslookup tool.
 Open the command prompt
 Type the command: Nslookup
Page 4 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
 Type the command: set type=mx
 Type the name of the domain that you want to display his MX record. In our
scenario: com
In the following screenshot, we can see the result of our MX query.
In our example, the host name of the Exchange Online server who represents our
domain is: o365info-com.mail.protection.outlook.com
Recap – enabling mail client to send E-mail message via the EOP
To enable a specific mail client to send an E-mail message via the EOP, all we need
to do is configure the host name of the EOP server as the “mail server”.
In our specific scenario, the Hostname who represents the domain
name: o365info.com is: o365info-com.mail.protection.outlook.com
Verifying communication with Exchange Online using
Telnet
In case that you want to check or simulate the communication channel to the EOP
server using a “standard SMTP session”, you can try to send E-mail via EOP using
Telnet session.
Page 5 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the following section, we will demonstrate how to use Telnet client for verifying
the communication channel with EOP.
Note – the Telnet client is not installed by default in the windows OS, you will need
to install the Telnet client.
 Windows 2008 – use the Server manager ==> add feature option and, then add
Telnet client.
 Window 7,8 – control panel ==> Programs and features ==> Turn Windows
features on or off and then, add Telnet client.
 Another option is to run the following command from the command
prompt: pkgmgr /iu:”TelnetClient”
In our example, the host name of the EOP that represents the domain
name: o365info.com is: o365info-com.mail.protection.outlook.com
Open a new command prompt and type the Telnet command using the following
syntax:
Telnet <Host name> <port>
In our example: Telnet o365info-com.mail.protection.outlook.com 25
In the following screenshot, we can see the result, the answer from the EOP server
appears on the screen:
Page 6 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
220 AM1FFO11FD029.mail.protection.outlook.com Microsoft ESMTP MAIL Service
ready at Sun, 3 May 2015 08:26:10 +0000
At this stage, we can know that
1. We know to “right host name” of the EOP server that represented our domain.
2. That the EOP server name was successfully resolved to an IP address.
3. That we can create an SMTP session (the firewall enables us to use SMTP, etc.).
In our scenario, we will send an E-mail message to a recipient
named: john@o365info.com
To simplify the test process, we will use the E-mail address of John also as the
“source E-mail address”.
In simple words: we will simulate a process in which John sends E-mail to himself by
addressing the EOP server.
1. Starting an SMTP session
The first command that we use for starting the SMTP session with the EOP server is:
Helo
The result is an answer that sends from the EOP server:
250 AM1FFO11FD029.mail.protection.outlook.com Hello [212.25.80.236]
2. Define the source recipient
In our scenario, the source recipient is: john@o365info.com
The Telnet commands that we use for configuring the source recipient is:
mail from:john@o365info.com
The EOP server reply is:
250 2.1.0 Sender OK
3. Define the destination recipient
In our scenario, the destination recipient is also: john@o365info.com
The Telnet command that we use for configuring the destination recipient is:
Page 7 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
rcpt to:john@o365info.com
The EOP server reply is:
250 2.1.5 Recipient OK
4. Create the E-mail message content
To be able to “tell” the destination mail server that we want to enter the E-mail
message content, we use the command: data
The EOP server reply is:
354 Start mail input; end with <CRLF>.<CRLF>
5. Ending the SMTP session
To be able to “tell” EOP server that we want to end the session and send the E-mail
message, we use the period charter: .
In our example, we see the response of the EOP server. The message “Queued mail
for delivery” is usually a good sign.
The meaning is that the destination mail server agrees to accept our E-mail
message and, the E-mail message was placed on the mail server queue.
250 2.6.0 <f9b0d90a-b4b6-4d72-9a7d-
0a5c92b71960@AM1FFO11FD029.protection.gbl>
[InternalId=13370233193878,
Hostname=HE1PR05MB1146.eurprd05.prod.outlook.com] Queued mail for delivery
Page 8 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
Verifying the SMTP communication channel with Exchange Online
Another way that we can use for: Verifying the SMTP communication channel with
Exchange Online and for getting more detailed information in a communication
failure scenario is a very nice and useful tool named: Basic SMTP Telnet Client
Note – the Basic SMTP Telnet Client doesn’t include an installation file but instead,
just a simple EXE file named: telnet25.exe
All you need to do is just double-click on the EXE file.
In the following section, we will demonstrate how to use the Basic SMTP Telnet
Client tool for creating an SMTP session with the Exchange Online server.
Scenario description: in our example, we will address the Exchange Online server
who represents the o365info.com domain name, and we will send the email
message from:john@o365info.com to himself.
1. Receive Connector IP – in our example, we will use the Exchange Online server
hostname: o365info-com.mail.protection.outlook.com
2. TCP Port – type 25 as the port number
3. Mail form: The E-mail address of the “source recipient” (in our
scenario john@o365info.com)
4. Recipient to: The E-mail address of the “destination recipient” (in our
scenariojohn@o365info.com)
Page 9 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
5. Subject: any text that you would like
To be able to send the E-mail message we need to move on to the “Telnet” tab
 Click on the SEND button.
Page 10 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the following screenshot, we can see the log of the SMTP session.
We can see information about the source and the destination recipients.
We can assume that the mail delivery completed successfully because in the Log we
can see the information: “Queued mail for delivery”.
Page 11 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
Prevent the scenario in which E-mail is identified as
spam.
When we implement the configuration of “anonymous” access to the EOP, meaning
is addressing the MX record of the EOP server who represents our domain name at
Office 365, one of the disadvantages is that most of the time, the E-mail message
that will be sent by the mail client (device or application) will be identified by the
EOP server as spam mail.
The reason is that when we use the address the EOP server and identify ourselves
as a recipient who use the same domain name is the domain name that is
“attached” to the EOP server.
For example: in a scenario in which the EOP server represents the domain name,
and we configure our mail client to use the E-mail address: printer@o365info.com,
when we address the EOP server, the fact that our mail client is not authenticated
the EOP server recognizes the source recipient as an element that tries to spoof his
identity.
Page 12 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
For this reason, the EOP server will not delete or reject the E-mail message, but
instead, “stamp” the E-mail message with a high value of SCL (Spam Confidence
Level).
The E-mail message that will be sent to the Office 365 recipients will be saved in the
junk mail folder.
In the following screenshot, we can see an example to a scenario in which mail that
was sent by a mail client to EOP using the MX record hostname, reach the
destination recipient mailbox but the E-mail message was “stamped” as a spam
mail.
When looking at the E-mail header, we can see that the EOP defines the SCL value
as “9”.
The meaning is a very high value which “tell” to the destination mail client to relate
to the specific E-mail message as a “dangerous mail”.
Page 13 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
Creating Exchange Online Bypass spam rule
To be able to deal with a scenario in which EOP server will “stamp” E-mail messages
that sent by a mail client as a spam mail, we can create a special Exchange Online
rule defines as:
bypass spam rule.
The logic of the Exchange Online rule is implemented as follows -condition and
action.
The condition: if a mail sends from a specific recipient or from a specific IP address.
Page 14 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
The action: relate to the E-mail message as trusted. In other words – set the SCL
value of the E-mail message to -1.
The value of “-1“, “tell” to the mail client that the E-mail message is trusted by the
mail server.
In the following section, we will demonstrate how to create an Exchange Online rule
that will apply the bypass spam rule for each mail that sent from a recipient who
uses the E-mail address: printer@o365info.com
 Login to the Exchange Online management portal
 Choose the mail flow menu and on the upper menu bar choose roles.
 Click on the plus icon for creating a new rule
 Choose the option: Create a new rule…
 In the name box, type the rule name. In our example –accept mail from on-
Premises printer
 Choose the option box – *apply this rule if…
 Choose the option: The sender is….
Page 15 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
 In the check name box add the name of the source recipient. In our example the
source recipient is – print@o365info.com
Page 16 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the next step, we need to define the “action part” of the rule.
Theoretically, to be able to configure the condition we need to “move on” to the
“*do the following…” but when choosing this option, we will not be able to find the
option of creating a bypass spam rule.
To configure the required condition, choose the option: More options…
Page 17 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
 Choose the menu – Modify the message properties
 Choose the menu – Set the spam confidence level (SCL)
Page 18 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
 Choose the option – Bypass spam filtering
Page 19 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
 Choose the option – Save
Page 20 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the following screenshot, we can see an E-mail message that was sent to the
Office 365 recipients from the source mail client (the printer device in our scenario).
Page 21 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015
In the following screenshot, we can see that when looking at the E-mail message
header that was sent to the Office 365 recipient, the SCL value is: “-1”
Page 22 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4
Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Contenu connexe

En vedette

Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Viennapathsproject
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
 
Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...pathsproject
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
Ozon
OzonOzon
OzonAyu P
 

En vedette (9)

Presentation
PresentationPresentation
Presentation
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 
Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...
 
Chocolate Games
Chocolate GamesChocolate Games
Chocolate Games
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
Ozon
OzonOzon
Ozon
 

Plus de Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...Eyal Doron
 

Plus de Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
 

Dernier

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Dernier (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Send mail to exchange online using standard smtp session part 2#4

  • 1. Page 1 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 Send mail to Exchange Online using standard SMTP session | Part 2#4 In the current article, we will review the process in which we want to enable a mail client such as Printer or application to send an E-mail message via the Exchange Online server. As mentioned in the former article – Send mail to Exchange Online | Part 1#4, we can address the Office 365 mail services using one of the following options:  Option 1 – creating a secure communication link between the mail client and the EOP server who is based on the mandatory requirement for encryption and authentication by the mail client.  Option 2 – creating a “non-secure” communication link between the mail client and the EOP server in which the mail client is not required to provide user credentials (anonymous) and the connection is based on the SMTP protocol (non-encrypted communication link). The option that we will review in the current article is – “option 2″.
  • 2. Page 2 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the next article (SMTP Relay in Office 365 environment | Part 3#4), we will review “option 1” – using a secure communication link to EOP using SMTP mail relay. Send mail to Exchange Online – Article Series  Send mail to Exchange Online | Part 1#4  Send mail to Exchange Online using standard SMTP session | Part 2#4  SMTP Relay in Office 365 environment | Part 3#4  SMTP Relay in Office 365 environment | Troubleshooting scenarios |Part 4#4 When we want to use the option of – non-secure” communication link to Exchange Online mail server, the process is quite simple. The main tasks that we have are: 1. Get the host name of the Exchange Online server (EOP) that represents our public domain name. 2. Configure the mail client to connect the Exchange Online server using the host name 3. Create connection filter rule or Exchange Online rule (transport rule) that will prevent the scenario in which Exchange Online will identify the E-mail as spam mail. Get the host name of the Exchange Online server who represents our domain in Office 365.
  • 3. Page 3 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 There are a two ways that we can use to get information about the FQDN (Fully Qualified Domain Name) of the Exchange Online that “send E-mail for our domain” Option 1: Office 365 administrate portal.  Login on to Office 365 portal as global administrator  On the left sidebar – choose the domain  Choose – Manage DNS Under the Exchange Online section, look for information about the MX record hostname (POINTS TO ADDRESS). In our scenario, the Exchange Online server who will “represent” our organization is: o365info-com.mail.protection.outlook.com Option 2: using the nslookup tool. Another option for getting information about the “Host name” of the Exchange Online mail server that “represent” our organization is: by using the nslookup tool.  Open the command prompt  Type the command: Nslookup
  • 4. Page 4 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015  Type the command: set type=mx  Type the name of the domain that you want to display his MX record. In our scenario: com In the following screenshot, we can see the result of our MX query. In our example, the host name of the Exchange Online server who represents our domain is: o365info-com.mail.protection.outlook.com Recap – enabling mail client to send E-mail message via the EOP To enable a specific mail client to send an E-mail message via the EOP, all we need to do is configure the host name of the EOP server as the “mail server”. In our specific scenario, the Hostname who represents the domain name: o365info.com is: o365info-com.mail.protection.outlook.com Verifying communication with Exchange Online using Telnet In case that you want to check or simulate the communication channel to the EOP server using a “standard SMTP session”, you can try to send E-mail via EOP using Telnet session.
  • 5. Page 5 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the following section, we will demonstrate how to use Telnet client for verifying the communication channel with EOP. Note – the Telnet client is not installed by default in the windows OS, you will need to install the Telnet client.  Windows 2008 – use the Server manager ==> add feature option and, then add Telnet client.  Window 7,8 – control panel ==> Programs and features ==> Turn Windows features on or off and then, add Telnet client.  Another option is to run the following command from the command prompt: pkgmgr /iu:”TelnetClient” In our example, the host name of the EOP that represents the domain name: o365info.com is: o365info-com.mail.protection.outlook.com Open a new command prompt and type the Telnet command using the following syntax: Telnet <Host name> <port> In our example: Telnet o365info-com.mail.protection.outlook.com 25 In the following screenshot, we can see the result, the answer from the EOP server appears on the screen:
  • 6. Page 6 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 220 AM1FFO11FD029.mail.protection.outlook.com Microsoft ESMTP MAIL Service ready at Sun, 3 May 2015 08:26:10 +0000 At this stage, we can know that 1. We know to “right host name” of the EOP server that represented our domain. 2. That the EOP server name was successfully resolved to an IP address. 3. That we can create an SMTP session (the firewall enables us to use SMTP, etc.). In our scenario, we will send an E-mail message to a recipient named: john@o365info.com To simplify the test process, we will use the E-mail address of John also as the “source E-mail address”. In simple words: we will simulate a process in which John sends E-mail to himself by addressing the EOP server. 1. Starting an SMTP session The first command that we use for starting the SMTP session with the EOP server is: Helo The result is an answer that sends from the EOP server: 250 AM1FFO11FD029.mail.protection.outlook.com Hello [212.25.80.236] 2. Define the source recipient In our scenario, the source recipient is: john@o365info.com The Telnet commands that we use for configuring the source recipient is: mail from:john@o365info.com The EOP server reply is: 250 2.1.0 Sender OK 3. Define the destination recipient In our scenario, the destination recipient is also: john@o365info.com The Telnet command that we use for configuring the destination recipient is:
  • 7. Page 7 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 rcpt to:john@o365info.com The EOP server reply is: 250 2.1.5 Recipient OK 4. Create the E-mail message content To be able to “tell” the destination mail server that we want to enter the E-mail message content, we use the command: data The EOP server reply is: 354 Start mail input; end with <CRLF>.<CRLF> 5. Ending the SMTP session To be able to “tell” EOP server that we want to end the session and send the E-mail message, we use the period charter: . In our example, we see the response of the EOP server. The message “Queued mail for delivery” is usually a good sign. The meaning is that the destination mail server agrees to accept our E-mail message and, the E-mail message was placed on the mail server queue. 250 2.6.0 <f9b0d90a-b4b6-4d72-9a7d- 0a5c92b71960@AM1FFO11FD029.protection.gbl> [InternalId=13370233193878, Hostname=HE1PR05MB1146.eurprd05.prod.outlook.com] Queued mail for delivery
  • 8. Page 8 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 Verifying the SMTP communication channel with Exchange Online Another way that we can use for: Verifying the SMTP communication channel with Exchange Online and for getting more detailed information in a communication failure scenario is a very nice and useful tool named: Basic SMTP Telnet Client Note – the Basic SMTP Telnet Client doesn’t include an installation file but instead, just a simple EXE file named: telnet25.exe All you need to do is just double-click on the EXE file. In the following section, we will demonstrate how to use the Basic SMTP Telnet Client tool for creating an SMTP session with the Exchange Online server. Scenario description: in our example, we will address the Exchange Online server who represents the o365info.com domain name, and we will send the email message from:john@o365info.com to himself. 1. Receive Connector IP – in our example, we will use the Exchange Online server hostname: o365info-com.mail.protection.outlook.com 2. TCP Port – type 25 as the port number 3. Mail form: The E-mail address of the “source recipient” (in our scenario john@o365info.com) 4. Recipient to: The E-mail address of the “destination recipient” (in our scenariojohn@o365info.com)
  • 9. Page 9 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 5. Subject: any text that you would like To be able to send the E-mail message we need to move on to the “Telnet” tab  Click on the SEND button.
  • 10. Page 10 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the following screenshot, we can see the log of the SMTP session. We can see information about the source and the destination recipients. We can assume that the mail delivery completed successfully because in the Log we can see the information: “Queued mail for delivery”.
  • 11. Page 11 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 Prevent the scenario in which E-mail is identified as spam. When we implement the configuration of “anonymous” access to the EOP, meaning is addressing the MX record of the EOP server who represents our domain name at Office 365, one of the disadvantages is that most of the time, the E-mail message that will be sent by the mail client (device or application) will be identified by the EOP server as spam mail. The reason is that when we use the address the EOP server and identify ourselves as a recipient who use the same domain name is the domain name that is “attached” to the EOP server. For example: in a scenario in which the EOP server represents the domain name, and we configure our mail client to use the E-mail address: printer@o365info.com, when we address the EOP server, the fact that our mail client is not authenticated the EOP server recognizes the source recipient as an element that tries to spoof his identity.
  • 12. Page 12 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 For this reason, the EOP server will not delete or reject the E-mail message, but instead, “stamp” the E-mail message with a high value of SCL (Spam Confidence Level). The E-mail message that will be sent to the Office 365 recipients will be saved in the junk mail folder. In the following screenshot, we can see an example to a scenario in which mail that was sent by a mail client to EOP using the MX record hostname, reach the destination recipient mailbox but the E-mail message was “stamped” as a spam mail. When looking at the E-mail header, we can see that the EOP defines the SCL value as “9”. The meaning is a very high value which “tell” to the destination mail client to relate to the specific E-mail message as a “dangerous mail”.
  • 13. Page 13 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 Creating Exchange Online Bypass spam rule To be able to deal with a scenario in which EOP server will “stamp” E-mail messages that sent by a mail client as a spam mail, we can create a special Exchange Online rule defines as: bypass spam rule. The logic of the Exchange Online rule is implemented as follows -condition and action. The condition: if a mail sends from a specific recipient or from a specific IP address.
  • 14. Page 14 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 The action: relate to the E-mail message as trusted. In other words – set the SCL value of the E-mail message to -1. The value of “-1“, “tell” to the mail client that the E-mail message is trusted by the mail server. In the following section, we will demonstrate how to create an Exchange Online rule that will apply the bypass spam rule for each mail that sent from a recipient who uses the E-mail address: printer@o365info.com  Login to the Exchange Online management portal  Choose the mail flow menu and on the upper menu bar choose roles.  Click on the plus icon for creating a new rule  Choose the option: Create a new rule…  In the name box, type the rule name. In our example –accept mail from on- Premises printer  Choose the option box – *apply this rule if…  Choose the option: The sender is….
  • 15. Page 15 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015  In the check name box add the name of the source recipient. In our example the source recipient is – print@o365info.com
  • 16. Page 16 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the next step, we need to define the “action part” of the rule. Theoretically, to be able to configure the condition we need to “move on” to the “*do the following…” but when choosing this option, we will not be able to find the option of creating a bypass spam rule. To configure the required condition, choose the option: More options…
  • 17. Page 17 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015  Choose the menu – Modify the message properties  Choose the menu – Set the spam confidence level (SCL)
  • 18. Page 18 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015  Choose the option – Bypass spam filtering
  • 19. Page 19 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015  Choose the option – Save
  • 20. Page 20 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the following screenshot, we can see an E-mail message that was sent to the Office 365 recipients from the source mail client (the printer device in our scenario).
  • 21. Page 21 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 In the following screenshot, we can see that when looking at the E-mail message header that was sent to the Office 365 recipient, the SCL value is: “-1”
  • 22. Page 22 of 22 | Send mail to Exchange Online using standard SMTP session | Part 2#4 Written by Eyal Doron | o365info.com | Copyright © 2012-2015