How to Secure Your Exchange Online Mail Flow with Inbound Connector Restrictions

How-to Configure Exchange Online connectors

If you use Exchange Online as your email service, you may want to protect your mail flow from unauthorised or malicious senders. One way to do that is to use inbound connector restrictions, which allow you to specify which IP addresses or domains are allowed or blocked from sending emails to your organisation.

In this blog post, I will explain what inbound connector restrictions are, how they work, and how to configure them in Exchange Online.

What are inbound connector restrictions?

Inbound connector restrictions are a feature of Exchange Online that let you control who can send emails through or into your organisation when using Exchange Online as a smtp relay. You can use them to:

  • Allow only specific IP addresses or domains to send emails to your organisation. This is also known as a whitelist or an allow list.
  • Block specific IP addresses or domains from sending emails to your organisation. This is also known as a blacklist or a block list.
  • Reject emails that do not match the criteria of your inbound connectors. This is also known as a default deny policy.

How do inbound connector restrictions work?

Inbound connector restrictions work by applying rules to the inbound connectors that you create in Exchange Online. An inbound connector is a configuration object that defines how Exchange Online receives emails from external sources, such as other email servers or cloud services.

You can create different types of inbound connectors depending on the source of the emails, such as:

  • Partner: For emails from trusted partners or third-party services that require authentication or encryption.
  • On-premises: For emails from your on-premises Exchange servers or hybrid deployments.
  • Internet: For emails from any other external sources that do not require authentication or encryption.

You can then apply inbound connector restrictions to each inbound connector by specifying the IP addresses or domains that are allowed or blocked from sending emails to your organisation.

For example, you can create an inbound connector of type Partner for a third-party service that sends newsletters to your users, and then apply an inbound connector restriction that allows only the IP address of the service to send emails to your organisation.

You can also create an inbound connector of type Internet for all other external sources, and then apply an inbound connector restriction that blocks any IP address or domain that is not on your allow list.

How to configure inbound connector restrictions in Exchange Online?

To configure inbound connector restrictions in Exchange Online, you need to use the Exchange admin center (EAC) or PowerShell.

Using the EAC, you can follow these steps:

  1. Sign in to the EAC with an account that has the Exchange administrator role.
  2. Go to Mail flow > Connectors.
  3. Click New (+) to create a new inbound connector, or select an existing one and click Edit (✎).
  4. In the New connector or Edit connector wizard, specify the following information:
  • Name: Give a descriptive name for your inbound connector.
  • Description: Optionally, provide a brief description of your inbound connector.
Connector 1
  • From: Select the source of the emails, such as Partner, On-premises, or Internet.
  • To: Select Office 365.
  • How do you want to identify the partner organisation?: Select how you want to identify the sender of the emails, such as by IP address, domain name, certificate subject name, or TLS domain name.
Connector 2
  • Restrict domains by IP addresses: Optionally, select this option if you want to restrict the domains that can send emails to your organisation by their IP addresses. This means that only the domains that have a matching IP address in your inbound connector will be allowed to send emails to your organisation. Strongly recommend as you don’t want an open relay on the internet that can be used for spamming purposes.
  • Reject email messages if they aren’t sent over TLS: Optionally, select this option if you want to reject any emails that are not sent over TLS encryption.
  • Reject email messages if they aren’t from within this IP address range: Optionally, select this option if you want to reject any emails that are not from within a specific IP address range. You can enter one or more IP addresses or ranges separated by commas.
  • Reject email messages if they aren’t from these domains: Optionally, select this option if you want to reject any emails that are not from specific domains. You can enter one or more domains separated by commas.
Connector 3
  1. Click Next and review your settings.
  2. Click Save to create or update your inbound connector.

Using PowerShell, you can use the New-InboundConnector and Set-InboundConnector cmdlets to create and update your inbound connectors with inbound connector restrictions.

For example, you can run the following command to create an inbound connector of type Partner for a third-party service that sends newsletters to your users, and then apply an inbound connector restriction that allows only the IP address of the service to send emails to your organisation:

New-InboundConnector -Name “Newsletter Service” -ConnectorType Partner -SenderIPAddresses 203.0.113.5 -RestrictDomainsToIPAddresses $true

You can run the following command to create an inbound connector of type Internet for all other external sources, and then apply an inbound connector restriction that blocks any IP address or domain that is not on your allow list:

New-InboundConnector -Name “Default Internet” -ConnectorType OnPremises -SenderDomains * -RequireTls $true -RejectMessageOnUnresolvedRecipient $true

You can run the following command to add an IP address or a domain to your allow list:

Set-InboundConnector “Default Internet” -SenderIPAddresses @{Add=“198.51.100.10”} -SenderDomains @{Add=“example.com”}

You can run the following command to remove an IP address or a domain from your allow list:

Set-InboundConnector “Default Internet” -SenderIPAddresses @{Remove=“198.51.100.10”} -SenderDomains @{Remove=“example.com”}

You can run the following command to view the settings of your inbound connectors:

Get-InboundConnector | Format-Table Name, ConnectorType, SenderIPAddresses, SenderDomains

Why use inbound connector restrictions?

Inbound connector restrictions can help you improve the security and reliability of your mail flow in Exchange Online. By using inbound connector restrictions, you can:

  • Prevent spam, phishing, and spoofing emails from reaching your users.
  • Ensure that only authorised and trusted senders can send emails to your organisation.
  • Reduce the risk of data leakage or compromise by enforcing encryption and authentication.
  • Simplify the management and troubleshooting of your mail flow by having clear and consistent rules.

Inbound connector restrictions are one of the many features that Exchange Online offers to help you protect your email environment.

I hope this blog post has helped you understand how to use inbound connector restrictions in Exchange Online. If you have any questions or feedback, please leave a comment below. Thank you for reading!


Like, Comment or WordPress Reblog the post and Subscribe to IT Service Guru for future blog posts.

Follow IT Service Guru

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Related Articles

Microsoft Ending Support in 2024

This article provides an overview of product retirements, end of servicing, products reaching end of support, and products moving to extended support in 2024 for Microsoft products. It explains the Modern Policy and Fixed Policy, outlining the differences and features of each. Additionally, it lists specific products and their retirement or support end dates, along with additional Azure changes and updates.

What You Need to Know About Google’s Third-Party Cookie Phase Out

As part of its Privacy Sandbox initiative, Google plans to start disabling third-party cookies for 1% of its Chrome users in Q1 2024—significantly affecting the online advertising industry. This decision is driven by privacy concerns and regulations like GDPR and CCPA. To provide alternatives, Google proposes new web APIs for privacy-conscious advertising and content. Advertisers and publishers need to prepare for this change by auditing cookie usage, testing website performance, and utilizing the new web APIs.

Why Cloudflare family DNS doesn’t work with Apple products with iCloud+ private relay on?

Cloudflare family DNS offers secure, filtered DNS resolution, but may have compatibility issues with Apple’s iCloud+ private relay. When using both, websites may not load correctly, and filtering options may be inconsistent. To resolve this, you can disable iCloud+ private relay, use a different DNS service, or selectively use both services for specific needs.

Live blog: Follow here Apple WWDC 2023 keynote address from 5pm UTC.

Join us as we cover the live updates from Apple’s WWDC 2023 event

Enterprise DNS Solutions

So, you’ve started a company, you’ve bought a domain name from a domain registrar, and you go to put your first DNS record in. STOP!!! Don’t leave DNS in the hands of a registrar that just looks to up sell addons. They may be great at getting you the domain name at the price point you’ve always wanted but that’s where it should end.

Responses

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from IT Service Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from IT Service Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading