The default Receive connector named "Client Frontend <Server name>" in the Client Access services on the Mailbox server listens for authenticated SMTP client submissions on port 587. By default, this connector uses the following settings for internal and external client (authenticated) SMTP connections:
SMTP server: <ServerFQDN>. For example, mailbox01.contoso.com.
TCP port: 587
Encryption method: TLS. Note that this is opportunistic TLS (STARTTLS) that results in an encrypted connection after the initial plain text protocol handshake.
To configure the authenticated SMTP settings that are used by POP3 and IMAP4 clients, perform the following steps:
Configure the FQDN on the "Client Frontend <Server name>" Receive connector.
Specify the certificate that's used to encrypt authenticated SMTP client connections.
Configure Outlook on the web (formerly known as Outlook Web App) to display the SMTP settings for authenticated SMTP clients at Settings > Options > Mail > Accounts > POP and IMAP.
Secure Sockets Layer (SSL) is being replaced by Transport Layer Security (TLS) as the protocol that's used to encrypt data sent between computer systems. They're so closely related that the terms "SSL" and "TLS" (without versions) are often used interchangeably. Because of this similarity, references to "SSL" in Exchange topics, the Exchange admin center, and the Exchange Management Shell have often been used to encompass both the SSL and TLS protocols. Typically, "SSL" refers to the actual SSL protocol only when a version is also provided (for example, SSL 3.0). To find out why you should disable the SSL protocol and switch to TLS, check out Protecting you against the SSL 3.0 vulnerability.
If you have POP3 or IMAP4 clients that can only send SMTP email on port 25, you can configure port 25 on the "Client Frontend <Server name>" Receive connector to allow clients to send authenticated SMTP email. However, because port 25 is also configured on the "Client Frontend <Server name>" Receive connector for email from external SMTP servers, you'll need to modify the local IP addresses that are used to listen on port 25 on one or both of the connectors. For more information, see Receive connector local address bindings.
You need to be assigned permissions before you can perform this procedure or procedures. To see what permissions you need, see the "Receive connectors" entry in the Mail flow permissions topic.
Step 1: Configure the FQDN on the "Client Frontend <Server name>" Receive connector
You can skip this step if you want to keep the default server FQDN value (for example, mailbox01.contoso.com). Or, you can specify an FQDN value that's more compatible with your Internet naming convention or a TLS certificate that you want to use.
If you change the FQDN value, and you want internal POP3 or IMAP4 clients to use this connector to send email, the new FQDN needs to have a corresponding record in your internal DNS.
Regardless of the FQDN value, if you want external POP3 or IMAP4 clients to use this connector to send email, the FQDN needs to have a corresponding record in your public DNS, and the TCP port (587) needs to be allowed through your firewall to the Exchange server.
Use the EAC to configure the FQDN for authenticated SMTP clients
In the EAC, go to Mail flow > Receive connectors.
In the list of Receive connectors, select Client Frontend <Server name>, and then click Edit ().
In the Exchange Receive Connector page that opens, click Scoping.
In the FQDN field, enter the SMTP server FQDN that you want to use for authenticated SMTP client connections (for example, mail.contoso.com) and then click Save.
Use the Exchange Management Shell to configure the FQDN for authenticated SMTP clients
To configure the FQDN for authenticated SMTP clients, use the following syntax:
Step 2: Use the Exchange Management Shell to specify the certificate that's used to encrypt authenticated SMTP client connections
The certificate needs to match or contain the FQDN value that you specified in the previous step, and the POP3 and SMTP clients need to trust the certificate, which likely means a certificate from a commercial certification authority. For more information, see Certificate requirements for Exchange services.
Verify the Subject or CertificateDomains field of the certificate that you specified on the Receive connector contains the Fqdn value of the Receive connector (exact match or wildcard match).
Step 3: Use the Exchange Management Shell to configure Outlook on the web to display the SMTP settings for authenticated SMTP clients
To configure Outlook on the web to display the SMTP settings server for authenticated SMTP clients, run the following command:
Note: To prevent the SMTP settings from being displayed in Outlook on the web, change the value from $true to $false.
How do you know this step worked?
To verify that you've configured Outlook on the web to display the SMTP settings for authenticated SMTP clients, perform the following steps:
Open a mailbox in Outlook on the web, and then click Settings > Options.
Click Mail > Accounts > POP and IMAP and verify the correct SMTP settings are displayed.
Note: If the SMTP settings that you configured don't appear as expected in Outlook on the web, run the commands net stop w3svc /y and net start w3svcto restart Internet Information Services (IIS).
How do you know this task worked?
To verify that you've configured the authenticated SMTP settings on the Exchange server, perform one or more following procedures:
Use the Test-PopConnectivity or Test-ImapConnectivity cmdlets, which use authenticated SMTP to send test messages. For more information, see Test-PopConnectivity and Test-ImapConnectivity.
Enable protocol logging on the "Client Frontend <Server name>" Receive connector, configure a POP3 or IMAP4 client to connect to a mailbox, send a test message from an internal network connection and/or an external Internet connection, and view the results in the protocol log. For more information, see Protocol logging.
Note: You can't use POP3 or IMAP4 to connect to the Administrator mailbox. This limitation was intentionally included in Exchange 2016 and Exchange 2019 to enhance the security of the Administrator mailbox.
This module examines how clients connect to Microsoft 365. It also provides instruction on how to configure name resolution and Outlook clients, and how to troubleshoot client connectivity.