How to prevent Symantec Mail Security for Microsoft Exchange (SMSMSE) from detecting internal messages as spam
search cancel

How to prevent Symantec Mail Security for Microsoft Exchange (SMSMSE) from detecting internal messages as spam

book

Article ID: 178777

calendar_today

Updated On:

Products

Mail Security for Microsoft Exchange

Issue/Introduction

 

Resolution

Add the servers internal to the Exchange environment to the list of internal senders in the Exchange transport configuration per Prevent Internal Servers from Being Filtered.

To add servers to the Exchange Hub Transport configuration using Powershell:

  1. Open the Microsoft Exchange Powershell.
  2. Run the command Set-TransportConfig -InternalSMTPServers @{add="ip address of server to ignore for spam"}
  3. Restart the Microsoft Exchange transport service for the setting to take effect.

After performing these steps, SMSMSE Premium Antispam will no longer scan connections coming from the added IP address for spam. These connections will still be scanned for AntiVirus, Content Filtering and File Filtering.

Symantec recommends against adding Front-End servers to this configuration, as this will prevent all connections coming from a Front-End server from being scanned for spam. This behavior is documented in Spam is not detected when Symantec Mail Security for Microsoft Exchange (SMSMSE) is installed on an Microsoft Exchange Edge or Hub server