Help Docs Server Administration Windows Server Administration Best Practices: Secure Mail Settings for MailEnable for Windows

Best Practices: Secure Mail Settings for MailEnable for Windows

Secure your MailEnable server on Windows. Learn how to configure SMTP authentication and relay settings to prevent your server from being an open relay for spam.

Setting up a new mail server can be an intimidating process. There are so many possible options that it can be difficult to know which settings are appropriate for your situation. Security settings are especially difficult because the wrong choices could leave your server vulnerable to attack or open to malicious users for sending spam. While the “default” settings recommended by the software vendor are right for most customers, there are a few settings that should be checked to verify that the mail server is configured correctly. This article focuses on MailEnable Mail Server on a Windows OS Server.

MailEnable Settings

Before checking or changing the settings for MailEnable, you first need to be able to find MailEnable’s control panel. MailEnable uses a Microsoft Management Console snap-in (or mmc) control panel. You can generally launch the control panel by going to the Windows start menu and typing “mailenable” into the search bar. You can also launch the control panel directly by finding the file mailenableadmin.msc and double-clicking it. That file will normally be found in the MailEnable file system inside the Admin folder (an example path would be C:Program FilesMailEnableAdminmailenableadmin.msc. This path may be different depending on your installation). Once you’ve launched the control panel, you will adjust the settings in the properties of the SMTP connection.

mailenable console

The settings we’re concerned with in this article will be found on the Relay tab in the SMTP Properties.

relay tab

Allow Mail Relay is the first check box on this tab and it must be enabled if you to be able to send email from this server. Because your computer or phone connect to the server remotely when attempting to send email, the server must be allowed to “relay” that mail to other mail servers. So while we want to prevent an “open relay”, we need to enable some relaying so that legitimate email can pass through the server.

Smtp Authentication

One of the simplest and best ways to prevent your mail server from being exploited is to require smtp authentication for all connections. This means that before anyone (or any script) is allowed to send an email, the user must first provide valid credentials for an account that is hosted on the server. Even web-forms and automated response scripts should use a valid account. This reduces the danger of a malicious user being able to send email through the system.

The first setting below Allow Mail Relay is Allow relay for authenticated senders. Enabling this option means that senders (whether individual users or scripts) that can provide valid credentials will be allowed to send email through the server. You can also select an authentication method by clicking the button labeled “Authentication Method”. Selecting MailEnable/Integrated authentication means that the mail server will use the credentials for the accounts that are created within MailEnable (this is the default setting and it is appropriate for most users).

allow mail relay option highlighted

Open Relays

You’ve probably heard of an email server being flagged as an “open relay” and being abused by spammers. An open relay means that the mail server is configured to accept mail from any sending source and forward that mail to any destination. Spammers use open relays to mask the point of origin for an email, attempting to defeat blacklists and other anti-spam measures.

open relay options highlighted

The setting for Allow relay for privileged IP ranges can be checked, but the default setting should be “Denied relay rights” except for the possible exception of the server itself (the IP address of 127.0.0.1). This may be necessary if your website sends emails to verify account registration or similar activities.

priviledged ip range screen

Allow relay for local sender addresses should be disabled because this setting depends on the sending computer to report the sender address. It is possible for a malicious user to provide false information (or spoof the source) and send spam through your server.

Secure Passwords

An important part in securing your mail server is requiring all of your users to use strong passwords. Much of the spamming that occurs on compromised servers comes from compromised accounts, not from incorrect settings on the server itself. The free edition of MailEnable does not allow you to create a policy to force the use of strong passwords (although this feature is available in the paid versions of MailEnable). If you are using a Plesk managed server, you can set the password policy to require strong passwords (see Best Practices: Setting a Required Password Strength). For more information on creating strong passwords, see Best Practice: Creating a Secure Password.

Was this article helpful?