I am experiencing an issue where some spam and phishing emails directly flow into my smartermail 15(latest Build) when I have an external spam solution that uses their MX and deliver back to my server.
I've already set all the domain spam filtering to "Add Text To Subject" to avoid another filtering and false positive.
I've provide a sample of the log below:
Return-Path: Received: from WIN-69HT5DUJQLL (hosted-by.rootlayer.net [126.96.36.199]) by mydomain.cc with SMTP; Wed, 30 Oct 2019 15:37:14 +0800 Received: from aiit.ac.jp ([127.0.0.1]) by WIN-69HT5DUJQLL with Microsoft SMTPSVC(8.5.9600.16384); Wed, 30 Oct 2019 00:38:48 -0700 From: mydomain.cc To: email@example.com Subject: SPAM-HIGH: Consult IT firstname.lastname@example.org Termination Date: 30 Oct 2019 00:38:48 -0700 Message-ID: <20191030003848.E147A2F483691361@aiit.ac.jp> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0012_EA5623E3.7BB91E40" Return-Path: email@example.com X-OriginalArrivalTime: 30 Oct 2019 07:38:48.0594 (UTC) FILETIME=[1150D720:01D58EF5] X-SmarterMail-Spam: Barracuda - BRBL, Reverse DNS Lookup [Passed], SPF_None, SURBL128:2, SURBL8:2 X-SmarterMail-TotalSpamWeight: 75
Is there any way or alternative method to prevent direct email delivery to my mail server and force them to pass through our external antispam(MX)?