{"id":1968,"date":"2016-04-20T04:41:59","date_gmt":"2016-04-20T04:41:59","guid":{"rendered":"http:\/\/pariswells.com\/blog\/?p=1968"},"modified":"2016-04-20T04:41:59","modified_gmt":"2016-04-20T04:41:59","slug":"inbound-and-outbound-365-smtp-filtering-mailguard","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/research\/inbound-and-outbound-365-smtp-filtering-mailguard","title":{"rendered":"Inbound and Outbound 365 SMTP Filtering Mailguard"},"content":{"rendered":"<p>What you need to do to enable Mailguard Filtering and Office<img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1972 img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/mailguard.png\" alt=\"mailguard\" width=\"203\" height=\"66\" \/> 365<\/p><p>Login to 365 Portal\u00a0<\/p><p><span style=\"text-decoration: underline;\"><strong>Inbound Filter by IP<\/strong><\/span><\/p><p>This forces all internal mail to only be accepted by 365 from Mailguard IP&#8217;s. Spammers start caching DNS records so even though you changed MX records they use old ones!<\/p><ul><li>Exchange Administration\u00a0<\/li><li>Mailflow<\/li><li>Connectors<\/li><\/ul><p><strong>From<\/strong> Partner Organization<br \/><strong>To<\/strong> Office 365<br \/><span id=\"ResultPanePlaceHolder_wizardFormSheet_contentContainer_IdentifyPartner_label\"><strong>How do you want to identify the partner organization? <\/strong>Domain<br \/><\/span><span id=\"ResultPanePlaceHolder_wizardFormSheet_contentContainer_SenderDomains_label\"><strong>Specify one or more sender domains:\u00a0<\/strong>*<br \/><\/span><strong>Reject email messages if they aren&#8217;t sent from within this IP address range\u00a0<\/strong>( IP Range from Mailguard )<\/p><div class=\"EcpCollectionEditor \" data-control=\"EcpCollectionEditor\" data-value=\"{senderDomainsList, Validators=[{Type: RequiredFieldValidator}]}\"><pre>203.21.125.32\/32\r\n69.16.202.203\/32\r\n174.36.235.195\/32\r\n69.16.202.216\/32\r\n50.23.246.238\/32\r\n50.23.252.166\/32\r\n108.168.255.216\/32\r\n108.168.255.217\/32\r\n203.21.125.33\/32<\/pre><p><span style=\"text-decoration: underline;\"><strong>Outbound\u00a0Filter forcing SMTP relay<\/strong><\/span><\/p><p>Make sure all Office 365 IP&#8217;s <a href=\"http:\/\/pastebin.com\/6UZZcWPQ\">http:\/\/pastebin.com\/6UZZcWPQ<\/a>\u00a0are in trusted networks<\/p><ul><li>Exchange Administration\u00a0<\/li><li>Mailflow<\/li><li>Connectors<\/li><\/ul><\/div><p><strong>Only when I have a transport rule set up that redirects messages to this connector<\/strong> &#8211; Tick<br \/><strong>Route email through these smart hosts<\/strong> :\u00a0filter.riskca-1.mailguard.com.au<br \/><strong>Always use Transport Layer Security (TLS) to secure the connection<\/strong> (recommended)<\/p><ul><li>Exchange Administration\u00a0<\/li><li>Mailflow<\/li><li>Rules<\/li><\/ul><p><strong>Name :\u00a0<\/strong>Relay Outbound through MailGuard<br \/><strong>*Apply this rule if&#8230; &#8211; The Sender is Located <\/strong>&#8230; Inside the organization<strong><br \/><\/strong><strong>*Do the following&#8230;\u00a0:<\/strong> Use the following connector<strong>\u00a0<\/strong>Name of Connector Above<\/p><p><span style=\"text-decoration: underline;\"><strong>SMTP SPF<\/strong><\/span><\/p><p>Add this include to the TXT record for the outgoing domains<\/p><p>include:customer.mailguard.<wbr \/>com<\/p>","protected":false},"excerpt":{"rendered":"<p>What you need to do to enable Mailguard Filtering and Office 365Login to 365 Portal\u00a0Inbound Filter by IPThis forces all internal mail to only be accepted by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1206,1428,1430,1429,1431,1176],"class_list":["post-1968","post","type-post","status-publish","format-standard","hentry","category-research","tag-1206","tag-inbound","tag-limits","tag-outbound","tag-relays","tag-smtp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=1968"}],"version-history":[{"count":4,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1968\/revisions"}],"predecessor-version":[{"id":1973,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1968\/revisions\/1973"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=1968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=1968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=1968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}