Created
August 26, 2018 19:17
-
-
Save janegilring/e43b1146910458c774f85f253e2bc7e6 to your computer and use it in GitHub Desktop.
Shows how to leverage the Get-Office365Endpoint script by Joerg Hochwald to configure Windows Firewall on a Microsoft Exchange Server to restrict SMTP traffic only from IP ranges used by Exchange Online Protection
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Define the Get-Office365Endpoint function in the current PowerShell session | |
Invoke-Expression ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/janegilring/PSCommunity/master/Office%20365/Get-Office365Endpoint.ps1')) | |
# Retrieve endpoints for Exchange Online and filter on TCP port 25 | |
$ExchangeOnlineEndpoints = Get-Office365Endpoint -Services Exchange | |
$ExchangeOnlineSMTPEndpoints = $ExchangeOnlineEndpoints | Where-Object { | |
$PSItem.ip -and | |
$PSItem.DisplayName -eq 'Exchange Online' -and | |
$PSItem.tcpPorts -contains '25' | |
} | |
# Restrict the Exchange Services listening on TCP port 25 to the retrieved IP addresses | |
Get-NetFirewallRule -DisplayName 'MSExchangeFrontendTransport (TCP-In)' | | |
Get-NetFirewallAddressFilter | | |
Set-NetFirewallAddressFilter -RemoteAddress $ExchangeOnlineSMTPEndpoints.ip | |
Get-NetFirewallRule -DisplayName 'MSExchangeTransportWorker (GFW) (TCP-In)' | | |
Get-NetFirewallAddressFilter | | |
Set-NetFirewallAddressFilter -RemoteAddress $ExchangeOnlineSMTPEndpoints.ip | |
# Verify | |
Get-NetFirewallRule -DisplayName 'MSExchangeFrontendTransport (TCP-In)' | | |
Get-NetFirewallAddressFilter | |
Get-NetFirewallRule -DisplayName 'MSExchangeTransportWorker (GFW) (TCP-In)' | | |
Get-NetFirewallAddressFilter |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment