Close Menu
Altcoinvest
    What's Hot

    DAILY UPDATE – THE ROAD AHEAD TO 260K! – BTC PRICE PREDICTION – BITCOIN FORECAST 260K BTC

    June 2, 2025

    SEC Challenges ETF Status of Proposed Staked Solana and Ether Funds

    June 1, 2025

    Mo Shaikh & Avery Ching Turned a Meta Mess Into Aptos Magic

    June 1, 2025
    Facebook X (Twitter) Instagram
    Altcoinvest
    • Bitcoin
    • Altcoins
    • Exchanges
    • Youtube
    • Crypto Wallets
    • Learn Crypto
    • bitcoinBitcoin(BTC)$104,479.00-0.22%
    • ethereumEthereum(ETH)$2,554.561.63%
    • tetherTether(USDT)$1.00-0.01%
    • rippleXRP(XRP)$2.170.56%
    • binancecoinBNB(BNB)$662.491.39%
    • solanaSolana(SOL)$154.27-0.45%
    • usd-coinUSDC(USDC)$1.000.00%
    • dogecoinDogecoin(DOGE)$0.1926271.27%
    • tronTRON(TRX)$0.267335-0.53%
    • cardanoCardano(ADA)$0.680.05%
    Altcoinvest
    Home»Exchange»How to Enable Recipient Filtering for Exchange Server
    How to Enable Recipient Filtering for Exchange Server
    Exchange

    How to Enable Recipient Filtering for Exchange Server

    May 23, 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Recipient filtering is a feature in Exchange Server that relies on the RCPT TO SMTP header to determine what action to take on an inbound message. Recipient filtering is performed by the Recipient Filter agent, which is part of the Anti-Spam Agents package. These agents are enabled by default on Edge Transport servers, however you need to enable them manually on Exchange Mailbox servers. In this article, you will learn how to enable recipient filtering for Exchange Server.

    Before you start

    Ensure you have a third-party spam filter in your organization. The one I highly recommend is SpamBull. It’s powerful, reliable, and keeps your organization users’ inbox clean and secure.

    Enable Recipient Filtering for Exchange Server

    To enable recipient filtering in Exchange Server, follow the steps below:

    1. Start Exchange Management Shell as administrator.
    2. Get a list of all the transport agents installed on the Exchange Server.
    Get-TransportAgent

    The output appears.

    Identity                                           Enabled         Priority
    --------                                           -------         --------
    Transport Rule Agent                               True            1
    DLP Policy Agent                                   True            2
    Retention Policy Agent                             True            3
    Supervisory Review Agent                           True            4
    Malware Agent                                      True            5
    Text Messaging Routing Agent                       True            6
    Text Messaging Delivery Agent                      True            7
    System Probe Drop Smtp Agent                       True            8
    System Probe Drop Routing Agent                    True            9
    1. If the Recipient Filter Agent is listed and enabled, you can skip this step. If not, install it using the command below.

    Note: When you run the script below, it will also install 4 other Anti-Spam agents. You must disable them, as shown in the next step. That’s because you already have a third-party spam filter set up, and you don’t want them to interfere with each other.

    & $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
    1. Enable the Recipient Filter Agent.
    Enable-TransportAgent "Recipient Filter Agent"
    1. Disable all other Anti-Spam Agents.
    Disable-TransportAgent "Content Filter Agent" -Confirm:$false
    Disable-TransportAgent "Sender Id Agent" -Confirm:$false
    Disable-TransportAgent "Sender Filter Agent" -Confirm:$false
    Disable-TransportAgent "Protocol Analysis Agent" -Confirm:$false
    1. Verify if the 4 Anti-Spam Agents are disabled.
    Get-TransportAgent

    The output appears.

    Identity                                           Enabled         Priority
    --------                                           -------         --------
    Transport Rule Agent                               True            1
    DLP Policy Agent                                   True            2
    Retention Policy Agent                             True            3
    Supervisory Review Agent                           True            4
    Malware Agent                                      True            5
    Text Messaging Routing Agent                       True            6
    Text Messaging Delivery Agent                      True            7
    System Probe Drop Smtp Agent                       True            8
    System Probe Drop Routing Agent                    True            9
    Content Filter Agent                               False           10
    Sender Id Agent                                    False           11
    Sender Filter Agent                                False           12
    Recipient Filter Agent                             True            13
    Protocol Analysis Agent                            False           14
    1. Ensure your accepted domains are using Address Book to check for valid recipients. By default, this should be enabled when Exchange is an authoritative Mailbox Server for the domain.
    Get-AcceptedDomain | Format-Table Name,AddressBookEnabled

    The output appears.

    Name        AddressBookEnabled
    ----        ------------------
    exoip.local               True
    exoip.com                 True
    1. If the Address Book is enabled, you can skip this step. If it’s disabled, use the following command to enable.
    Set-AcceptedDomain example.com -AddressBookEnabled $true
    1. Enable recipient validation.
    Set-RecipientFilterConfig -RecipientValidationEnabled $true
    1. Get the receive connectors on the Exchange Server.
    Get-ReceiveConnector | Format-Table Name, Bindings

    The output appears.

    Name                              Bindings
    ----                              --------
    Default EX01-2019                 {0.0.0.0:2525, [::]:2525}
    Client Proxy EX01-2019            {[::]:465, 0.0.0.0:465}
    Default Frontend EX01-2019        {[::]:25, 0.0.0.0:25}
    Outbound Proxy Frontend EX01-2019 {[::]:717, 0.0.0.0:717}
    Client Frontend EX01-2019         {[::]:587, 0.0.0.0:587}
    1. Write down the name of the connector with binding ending with :2525 (listening on connections from port 2525). This is most likely the Default receive connector.
    2. Set the receive connector to accept unauthenticated SMTP connections.
    Set-ReceiveConnector -Identity "Default EX01-2019" -PermissionGroups "AnonymousUsers, ExchangeUsers, ExchangeServers, ExchangeLegacyServers"
    1. Restart the Microsoft Exchange Transport service.
    Restart-Service MSExchangeTransport
    1. Open port 2525 on the firewall to the Exchange Server.
    2. Edit the route in the SpamBull spam filter (Domain Level Control Panel > Incoming > Destinations) to use port 2525 rather than port 25.
    Enable Recipient Filtering for Exchange Server SpamBullEnable Recipient Filtering for Exchange Server SpamBull
    1. Disable port 25 on the firewall to the Exchange Server.
    2. Send an email and verify that it’s successful.

    That’s it!

    Read more: ISP blocks SMTP port 25 – Bypass/Fix »

    Conclusion

    You learned how to enable recipient filtering for Exchange Server. It’s an excellent feature to set up, as it checks if incoming emails are sent to valid recipients on your Exchange server. This helps block emails sent to non-existent users. Remember to apply the steps to all the Exchange Servers.

    Did you enjoy this article? You may also like Exchange SMTP high availability with Kemp load balancer. Don’t forget to follow us and share this article.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    May 2025 Exchange Server Hotfix Updates

    May 31, 2025

    What is SharePoint brand center and how to use it?

    May 28, 2025

    New-Mailboximportrequest Baditemlimit In Exchange 2013 / 2010

    May 26, 2025

    cloud.microsoft: Microsoft’s new top level domain

    May 21, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Tweets by InfoAltcoinvest

    Top Posts

    May 2025 Exchange Server Hotfix Updates

    May 31, 2025

    What is SharePoint brand center and how to use it?

    May 28, 2025

    New-Mailboximportrequest Baditemlimit In Exchange 2013 / 2010

    May 26, 2025

    THIS is the biggest crypto opportunity | Dan Morehead

    April 7, 2025

    Solana Futures ETFs Launch on DTCC, SEC Approval Looms

    March 2, 2025

    SEC drops investigation into NFT marketplace OpenSea

    February 22, 2025

    Complete Guide to Earning Passive Income with Cryptocurrency

    May 4, 2025

    Altcoinvest is a leading platform dedicated to providing the latest news and insights on the dynamic world of cryptocurrencies.

    We're social. Connect with us:

    Facebook X (Twitter)
    Top Insights

    DAILY UPDATE – THE ROAD AHEAD TO 260K! – BTC PRICE PREDICTION – BITCOIN FORECAST 260K BTC

    June 2, 2025

    SEC Challenges ETF Status of Proposed Staked Solana and Ether Funds

    June 1, 2025

    Mo Shaikh & Avery Ching Turned a Meta Mess Into Aptos Magic

    June 1, 2025
    Get Informed

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.


    Facebook X (Twitter)
    • Home
    • About us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    © 2025 altcoinvest.com

    Type above and press Enter to search. Press Esc to cancel.