Close Menu
Altcoinvest
    What's Hot

    GalaxyOne Head Wants Retail Investors to Stake More, Predict Less

    April 19, 2026

    Kelp Hacked, Losses Climb to $293M As Other Protocols Impacted

    April 18, 2026

    Iran, US issue conflicting statements on Strait of Hormuz

    April 18, 2026
    Facebook X (Twitter) Instagram
    Altcoinvest
    • Bitcoin
    • Altcoins
    • Exchanges
    • Youtube
    • Crypto Wallets
    • Learn Crypto
    • bitcoinBitcoin(BTC)$75,823.00-1.69%
    • ethereumEthereum(ETH)$2,354.44-2.65%
    • tetherTether(USDT)$1.000.00%
    • rippleXRP(XRP)$1.43-2.79%
    • binancecoinBNB(BNB)$630.41-2.07%
    • usd-coinUSDC(USDC)$1.000.01%
    • solanaSolana(SOL)$86.28-2.83%
    • tronTRON(TRX)$0.3296340.47%
    • Figure HelocFigure Heloc(FIGR_HELOC)$1.041.31%
    • dogecoinDogecoin(DOGE)$0.094919-4.38%
    Altcoinvest
    Home»Exchange»How to Enable Recipient Filtering for Exchange Server
    How to Enable Recipient Filtering for Exchange Server
    Exchange

    How to Enable Recipient Filtering for Exchange Server

    May 23, 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Recipient filtering is a feature in Exchange Server that relies on the RCPT TO SMTP header to determine what action to take on an inbound message. Recipient filtering is performed by the Recipient Filter agent, which is part of the Anti-Spam Agents package. These agents are enabled by default on Edge Transport servers, however you need to enable them manually on Exchange Mailbox servers. In this article, you will learn how to enable recipient filtering for Exchange Server.

    Before you start

    Ensure you have a third-party spam filter in your organization. The one I highly recommend is SpamBull. It’s powerful, reliable, and keeps your organization users’ inbox clean and secure.

    Enable Recipient Filtering for Exchange Server

    To enable recipient filtering in Exchange Server, follow the steps below:

    1. Start Exchange Management Shell as administrator.
    2. Get a list of all the transport agents installed on the Exchange Server.
    Get-TransportAgent

    The output appears.

    Identity                                           Enabled         Priority
    --------                                           -------         --------
    Transport Rule Agent                               True            1
    DLP Policy Agent                                   True            2
    Retention Policy Agent                             True            3
    Supervisory Review Agent                           True            4
    Malware Agent                                      True            5
    Text Messaging Routing Agent                       True            6
    Text Messaging Delivery Agent                      True            7
    System Probe Drop Smtp Agent                       True            8
    System Probe Drop Routing Agent                    True            9
    1. If the Recipient Filter Agent is listed and enabled, you can skip this step. If not, install it using the command below.

    Note: When you run the script below, it will also install 4 other Anti-Spam agents. You must disable them, as shown in the next step. That’s because you already have a third-party spam filter set up, and you don’t want them to interfere with each other.

    & $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
    1. Enable the Recipient Filter Agent.
    Enable-TransportAgent "Recipient Filter Agent"
    1. Disable all other Anti-Spam Agents.
    Disable-TransportAgent "Content Filter Agent" -Confirm:$false
    Disable-TransportAgent "Sender Id Agent" -Confirm:$false
    Disable-TransportAgent "Sender Filter Agent" -Confirm:$false
    Disable-TransportAgent "Protocol Analysis Agent" -Confirm:$false
    1. Verify if the 4 Anti-Spam Agents are disabled.
    Get-TransportAgent

    The output appears.

    Identity                                           Enabled         Priority
    --------                                           -------         --------
    Transport Rule Agent                               True            1
    DLP Policy Agent                                   True            2
    Retention Policy Agent                             True            3
    Supervisory Review Agent                           True            4
    Malware Agent                                      True            5
    Text Messaging Routing Agent                       True            6
    Text Messaging Delivery Agent                      True            7
    System Probe Drop Smtp Agent                       True            8
    System Probe Drop Routing Agent                    True            9
    Content Filter Agent                               False           10
    Sender Id Agent                                    False           11
    Sender Filter Agent                                False           12
    Recipient Filter Agent                             True            13
    Protocol Analysis Agent                            False           14
    1. Ensure your accepted domains are using Address Book to check for valid recipients. By default, this should be enabled when Exchange is an authoritative Mailbox Server for the domain.
    Get-AcceptedDomain | Format-Table Name,AddressBookEnabled

    The output appears.

    Name        AddressBookEnabled
    ----        ------------------
    exoip.local               True
    exoip.com                 True
    1. If the Address Book is enabled, you can skip this step. If it’s disabled, use the following command to enable.
    Set-AcceptedDomain example.com -AddressBookEnabled $true
    1. Enable recipient validation.
    Set-RecipientFilterConfig -RecipientValidationEnabled $true
    1. Get the receive connectors on the Exchange Server.
    Get-ReceiveConnector | Format-Table Name, Bindings

    The output appears.

    Name                              Bindings
    ----                              --------
    Default EX01-2019                 {0.0.0.0:2525, [::]:2525}
    Client Proxy EX01-2019            {[::]:465, 0.0.0.0:465}
    Default Frontend EX01-2019        {[::]:25, 0.0.0.0:25}
    Outbound Proxy Frontend EX01-2019 {[::]:717, 0.0.0.0:717}
    Client Frontend EX01-2019         {[::]:587, 0.0.0.0:587}
    1. Write down the name of the connector with binding ending with :2525 (listening on connections from port 2525). This is most likely the Default receive connector.
    2. Set the receive connector to accept unauthenticated SMTP connections.
    Set-ReceiveConnector -Identity "Default EX01-2019" -PermissionGroups "AnonymousUsers, ExchangeUsers, ExchangeServers, ExchangeLegacyServers"
    1. Restart the Microsoft Exchange Transport service.
    Restart-Service MSExchangeTransport
    1. Open port 2525 on the firewall to the Exchange Server.
    2. Edit the route in the SpamBull spam filter (Domain Level Control Panel > Incoming > Destinations) to use port 2525 rather than port 25.
    Enable Recipient Filtering for Exchange Server SpamBullEnable Recipient Filtering for Exchange Server SpamBull
    1. Disable port 25 on the firewall to the Exchange Server.
    2. Send an email and verify that it’s successful.

    That’s it!

    Read more: ISP blocks SMTP port 25 – Bypass/Fix »

    Conclusion

    You learned how to enable recipient filtering for Exchange Server. It’s an excellent feature to set up, as it checks if incoming emails are sent to valid recipients on your Exchange server. This helps block emails sent to non-existent users. Remember to apply the steps to all the Exchange Servers.

    Did you enjoy this article? You may also like Exchange SMTP high availability with Kemp load balancer. Don’t forget to follow us and share this article.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    How to Block Soft and Hard Match in Microsoft Entra ID

    April 7, 2026

    How to connect to Microsoft 365 with Microsoft Graph PowerShell

    March 27, 2026

    February 2026 Exchange Server Security Updates

    March 5, 2026

    How to Fix 550 5.1.10 RESOLVER.ADR.RecipientNotFound in Exchange Server

    March 5, 2026
    Add A Comment

    Comments are closed.

    Tweets by InfoAltcoinvest

    Top Posts

    How to Block Soft and Hard Match in Microsoft Entra ID

    April 7, 2026

    How to connect to Microsoft 365 with Microsoft Graph PowerShell

    March 27, 2026

    February 2026 Exchange Server Security Updates

    March 5, 2026

    Zero Knowledge Proof’s Fair Presale Auction Goes Live As SHIB Battles for Stability

    December 1, 2025

    Mezo & Aerodrome: Bitcoin Is Finally Getting Real Yield

    March 27, 2026

    THE DOG FIGHT! SHIBA INU VS DOGECOIN

    July 24, 2025

    Binance Launches $40 Million WLFI Airdrop for USD1 Holders

    January 23, 2026

    Altcoinvest is a leading platform dedicated to providing the latest news and insights on the dynamic world of cryptocurrencies.

    We're social. Connect with us:

    Facebook X (Twitter)
    Top Insights

    GalaxyOne Head Wants Retail Investors to Stake More, Predict Less

    April 19, 2026

    Kelp Hacked, Losses Climb to $293M As Other Protocols Impacted

    April 18, 2026

    Iran, US issue conflicting statements on Strait of Hormuz

    April 18, 2026
    Get Informed

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.


    Facebook X (Twitter)
    • Home
    • About us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    © 2026 altcoinvest.com

    Type above and press Enter to search. Press Esc to cancel.