Quantcast
Channel: Exchange Server 2013 - Mail Flow and Secure Messaging forum
Viewing all articles
Browse latest Browse all 3660

HealthMailbox....... thousands of tranfers appearing in SPAM quarantine

$
0
0

I've asked this question on another forum without an answer so I thought I would try here.

This relates to Exchange 2013.  During Friday through to Monday I am picking up thousands of spam items sent frominboundproxy@inboundproxy.com and up to five HealthMailboxes are involved.  The healthmailboxes have accounts in AD and appeared during the Exchange installation.

Here is and example -

Diagnostic information for administrators:

Generating server: EXCHANGE2.xxxxx.yyyyyyyy.yy.yy

HealthMailbox168a97e4814144848b101e39c3482fca@xxxxx.yyyyyyyy.yy.yy
#550 5.2.1 Content Filter agent quarantined this message ##

Original message headers:

Received: from EXCHANGE2.xxxxx.yyyyyyyy.yy.yy (192.168.0.72) by
 EXCHANGE2.xxxxx.yyyyyyyy.yy.yy (192.168.0.72) with Microsoft SMTP Server
 (TLS) id 15.0.516.32; Mon, 19 Nov 2012 19:20:48 +0000
Received: from InboundProxyProbe (::1) by EXCHANGE2.xxxxx.yyyyyyyy.yy.yy
 (::1) with Microsoft SMTP Server id 15.0.516.32 via Frontend Transport; Mon,
 19 Nov 2012 19:20:48 +0000
Subject: Inbound proxy probe
Message-ID: <2e1d9dd2-d71e-4c23-9b5a-b8e12c109e57@EXCHANGE2.xxxxx.yyyyyyyy.yy.yy>
From: <inboundproxy@inboundproxy.com>
To: Undisclosed recipients:;
Return-Path: inboundproxy@inboundproxy.com
Date: Mon, 19 Nov 2012 19:20:48 +0000
MIME-Version: 1.0
Content-Type: text/plain
Received-SPF: Fail (EXCHANGE2.xxxxx.yyyyyyyy.yy.yy: domain of
 inboundproxy@inboundproxy.com does not designate ::1 as permitted sender)
 receiver=EXCHANGE2.xxxxx.yyyyyyyy.yy.yy; client-ip=::1;
 helo=InboundProxyProbe;

 
Can anyone spread light on this, is it normal behaviour and if not how can I stop it?  The exchange installation is on a green field domain.  The exchange server is an OOTB installation on a single VM.







Viewing all articles
Browse latest Browse all 3660

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>