CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
 

This article applies to:

  • MailMarshal/SEG Cloud

Symptoms:

  • Sending a message through MailMarshal Cloud
  • Message refused with SMTP response: 550 Mail refused by local domain enforcement policy

Causes:

  • The sender (MAIL FROM) and recipient (RCPT TO) of the message are both external.
    • "External" means "not in domains managed through MailMarshal Cloud."
  • Relaying of messages through MailMarshal Cloud between external addresses is not allowed.

Resolution:

For messages outbound from your servers, be sure the sender address is within your domains managed through MailMarshal Cloud.

Notes:

  • One common reason for this issue is a Microsoft Exchange distribution list that has external contacts as members. With some Exchange versions, when a message is sent to the list by an external sender, Exchange attempts to deliver it to external recipients with the external user as the From address.
  • To ensure delivery to distribution lists with external members:
    • For Exchange environments including Exchange Online, you can configure the main outbound connector so that it only sends messages through MailMarshal Cloud if it is "from" a local domain address.
      • Make sure there is an additional delivery option that sends the mail "from" external addresses directly, bypassing MailMarshal Cloud. 
      • Any mailing list messages would have been scanned inbound, so the threat/security risk from lack of outbound scanning is low.
    • Another option that works with any mailbox solution is to use mailing list management software. This type of software re-sends the messages with a valid local sender address. Many free solutions are available.

Trustwave MailMarshal Cloud KB article Q21050

Last Modified: August 19, 2018

 Turn On Turn Off Highlight