{"id":1366,"date":"2017-09-19T10:20:30","date_gmt":"2017-09-19T15:20:30","guid":{"rendered":"https:\/\/it.thelibrarie.com\/weblog\/?p=1366"},"modified":"2017-09-19T10:20:30","modified_gmt":"2017-09-19T15:20:30","slug":"list-trusted-and-blocked-senders-for-exchange-user","status":"publish","type":"post","link":"https:\/\/it.thelibrarie.com\/weblog\/2017\/09\/list-trusted-and-blocked-senders-for-exchange-user\/","title":{"rendered":"List Trusted and Blocked Senders for Exchange User"},"content":{"rendered":"<p>One of the EA&#8217;s reported that an email was not going through to the CEO from a vendor\/partner and the NDR was:<\/p>\n<blockquote><p>Generating server: myemailserver.tld<br \/>\nCEO@mycompany.tld<br \/>\n#< #5.1.0 smtp;<strong>554 5.1.0 Sender denied<\/strong>> #SMTP#<br \/>\nOriginal message headers:<br \/>\nReceived: from spam.myemailserver.tld (8.8.33.145) by mail.myemailserver.tld<br \/>\n (192.168.100.3) with Microsoft SMTP Server id 14.3.361.1; Mon, 18 Sep 2017<br \/>\n 22:25:26 -0500<br \/>\nX-Note: Xit Build: 3\/21\/2017 2:04:32 PM UTC (2.6.15.0) XIT_SCAN_PASSED<br \/>\nReceived: from [10.60.1.167] (HELO inbound.spamprovider.com)  by<br \/>\n spam.myemailserver.tld (CommuniGate Pro SMTP 6.1.7)  with ESMTP id 51998793;<br \/>\n Mon, 18 Sep 2017 23:25:26 -0400<br \/>\nX-Note: This Email was scanned by SomeProduct SPAMThing<br \/>\nX-Note-AR-ScanTimeLocal: 09\/18\/2017 11:25:26 PM<br \/>\nX-Note: SomeProduct Build: 8\/31\/2017 11:17:18 AM UTC (2.6.21.34)<br \/>\nX-Note: Filtered by 10.60.1.167<br \/>\nX-Policy: mycompany.tld<br \/>\nX-Primary: OtherUser@Mycompany.tld<br \/>\nX-Virus-Scan: V-<br \/>\nX-Note: SPF: IP: 167.31.17.139  DOM: VENDOREMAIL.TLD ADDR: partner@VENDOREMAIL.TLD<br \/>\nX-Note: SPF: Pass<\/p><\/blockquote>\n<p>So we notice that it went through from an SPF range &#8211; and I cut out the back and forth accepting of the message that normally comes with the NDR\/DR &#8211; and left the &#8220;554 5.1.0 Sender Denied&#8221; portion (bolded above).<\/p>\n<p>Since we run Exchange I could check using powershell for exchange. Go figure.<\/p>\n<p><strong>Trusted Senders List<\/strong><br \/>\n<code>$TSD = (Get-MailboxJunkEmailConfiguration -Identity MYCEO_User).TrustedSendersAndDomains<\/code><br \/>\n<code>$TSD > c:\\temp\\Trusted_Senders.txt<\/code><\/p>\n<p><strong>Blocked Senders List<\/strong><br \/>\n<code>$TSD = (Get-MailboxJunkEmailConfiguration -Identity alan.handley).TrustedSendersAndDomains<\/code><br \/>\n<code>$TSD > c:\\temp\\Blocked_senders.txt<\/code><\/p>\n<p>I should note that I first tried:<br \/>\n<code>Get-MailboxJunkEmailConfiguration -ResultSize unlimited MYCEO_User > c:\\temp\\results.txt<\/code><br \/>\nBut with that it was still truncating the results. Meh.<\/p>\n<p><strong>Remove an Entry<\/strong><br \/>\n<code>Set-MailboxJunkEmailConfiguration -Identity MYUSER -BlockedSendersAndDomains @{Remove=\"vendor@partner.tld\"}<\/code><\/p>\n<p><strong>Add an Entry<\/strong><br \/>\n<code>Set-MailboxJunkEmailConfiguration -Identity ANOTHERUSER -TrustedSendersAndDomains @{Add=\"Vendor@partner.tld\"}<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the EA&#8217;s reported that an email was not going through to the CEO from a vendor\/partner and the NDR was: Generating server: myemailserver.tld CEO@mycompany.tld #< #5.1.0 smtp;554 5.1.0 Sender denied> #SMTP# Original message headers: Received: from spam.myemailserver.tld (8.8.33.145) by mail.myemailserver.tld (192.168.100.3) with Microsoft SMTP Server id 14.3.361.1; Mon, 18 Sep 2017 22:25:26 -0500 &hellip; <a href=\"https:\/\/it.thelibrarie.com\/weblog\/2017\/09\/list-trusted-and-blocked-senders-for-exchange-user\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">List Trusted and Blocked Senders for Exchange User<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1366","post","type-post","status-publish","format-standard","hentry","category-microsoft"],"_links":{"self":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/comments?post=1366"}],"version-history":[{"count":1,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1366\/revisions"}],"predecessor-version":[{"id":1367,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1366\/revisions\/1367"}],"wp:attachment":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/media?parent=1366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/categories?post=1366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/tags?post=1366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}