Microsoft smart host




















For more information about defining accepted domains, see Manage accepted domains in Exchange Online and Enable mail flow for subdomains in Exchange Online. Decide whether you want to use mail flow rules also known as transport rules or domain names to deliver mail from Microsoft or Office to your email servers.

Most businesses choose to deliver mail for all accepted domains. For more information, see Scenario: Conditional mail routing in Exchange Online. You can set up mail flow rules as described in Mail flow rule actions in Exchange Online. For example, you might want to use mail flow rules with connectors if your mail is currently directed via distribution lists to multiple sites. Before you set up a new connector, check for any connectors that are already listed here for your organization.

For example, if you ran the Exchange Hybrid Configuration wizard , connectors that deliver mail between Microsoft or Office and Exchange Server will be set up already and listed here, as shown in the following two screenshots, for New Exchange admin center EAC and Classic EAC, respectively. If the connectors are already listed, you don't need to set them up again, but you can edit them if you need to. If you don't plan to use the hybrid configuration wizard, or if you're running Exchange Server or earlier, or if you're running a non-Microsoft SMTP mail server, or if no connector is listed from your organization's mail server to Microsoft or Office , set up a connector using the wizard, as described in the procedures below.

Before creating a connector, navigate to the new EAC from the Microsoft admin center by clicking Exchange under the Admin centers pane. The Connectors screen appears. Provide a name for the connector and click Next. The Use of connector screen appears. Choose an option that determines when you want to use the connector, and click Next. The Routing screen appears. For information on choosing one of the three option on the Use of connector screen and the reasons for choosing that option, see Options determining use of connector , below in this article.

Enter the domain name or IP address of the host computer to which Office will deliver email messages. You can navigate to the next screen without choosing anything on this screen. If you are choosing the Issue by a trusted certificate authority CA option, the Add the subject name or subject alternative name SAN matches this domain name option is activated.

It is optional to choose the Add the subject name or subject alternative name SAN matches this domain name option. However, if you choose it, you must enter the domain name to which the certificate name matches.

Once the validation process is completed, click Next. The Review connector screen appears. On the first screen, choose the options that are depicted in the following screenshot. Click Next , and follow the instructions in the wizard. Click the Help or Learn More links if you need more information. The wizard will guide you through setup.

At the end, make sure your connector validates. If the connector does not validate, double-click the message displayed to get more information, and see Validate connectors for help resolving issues. To redirect email flow to Microsoft or Office , change the MX mail exchange record for your domain.

For instructions on how to do this task, see Add DNS records to connect your domain. If any connectors already exist for your organization, they are displayed on clicking Connectors. Once you select the Your organization's email server radio button under Connection from , the option under Connection to is greyed out, implying that it is the default option chosen.

The replacement occurs on the first hop only. For Masquerade domain, type a domain name that you want to appear in message headers, instead of the actual name of the domain. At startup, the name that is designated on the Network Identification tab of the System Properties dialog box is automatically used for the fully qualified domain name FQDN. If you change the name either manually or by joining a Microsoft Windows domain , the new name is automatically used for the FQDN the next time the computer is restarted.

You do not have to perform any action to update the FQDN for the virtual server. To override the automatic use of the computer and domain names on the Network Identification tab, change the FQDN in the Advanced Delivery dialog box this is accessed through the Delivery tab.

To set the FQDN, follow these steps:. You can route all outgoing messages for remote domains through a smart host instead of sending them directly to the domain. This permits you to route messages over a connection that may be more direct or less costly than other routes.

The smart host is similar to the route domain option for remote domains. The difference is that after a smart host is designated, all outgoing messages are routed to that server. With a route domain, only messages for the remote domain are routed to a specific server.

If you set up a smart host, you can still designate a different route for a remote domain. The route domain setting overrides the smart host setting. To set up a smart host, follow these steps:. In Smart host, type the name of the smart host server. You can type a string to represent a name, or you can type an IP address.

If you want the Microsoft SMTP Service to try to deliver remote messages directly before it forwards them to the smart host server, click to select the Attempt direct delivery before sending to smart host check box. The default is to send all remote messages to the smart host, not to try direct delivery. Note that if you change the IP address, you must also change it on every virtual server.

It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly used software. Because drive-by attacks can happen even if the user does not click or download anything on the page, the danger often goes unnoticed. For more info about drive-by attacks, see Evolving Microsoft Defender SmartScreen to protect you from drive-by attacks. Reputation-based URL and app protection.

Microsoft Defender SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file.

If a URL, a file, an app, or a certificate has an established reputation, users won't see any warnings. If, however, there's no reputation, the item is marked as a higher risk and presents a warning to the user. Operating system integration. Microsoft Defender SmartScreen is integrated into the Windows 10 operating system.

It checks any files an app including 3rd-party browsers and email clients attempts to download and run. We aren't using the SourceTransportServer parameter, and the default value is the local Exchange server.

The Send connector isn't scoped to the local Active Directory site. The Send connector is useable by all Exchange transport servers in the Active Directory forest. For information about other options, see New-SendConnector. To verify that you have successfully created a Send connector to route outbound email through a smart host, send a message from a user in your organization to an external domain that's serviced by the Send connector. You can also turn on protocol logging for the Send connector, and view the information in the log.

For more information, see Protocol logging. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Is this page helpful? Please rate your experience Yes No. Any additional feedback? Tip Having problems? In this article. No authentication.



0コメント

  • 1000 / 1000