Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Emails that are sent with blank sender addresses can be blocked by creating and enabling a Connection rule.
Current versions of the product include a default rule 'Reject Messages with Blank Return Path' that is disabled by default
If your installation was upgraded from an older version and does not include this rule, you can add it manually. See the current Default Rules document for a definition of this rule.
Enabling this rule will make you RFC non-compliant. SMTP servers must accept mail with blank return paths for the purposes of handling their own NDRs and returned messages.
Be aware that turning on this rule could also result in your server being blocked as a "bad actor" by other server, if your server rejects messages that you are required to accept.
This rule can also interfere with sender verification techniques used by some other email software.
If you choose to block messages with blank "Mail From" you should only do so temporarily, and monitor activity closely.
See the following Trustwave Knowledgebase article for more information:
To contact Trustwave about this article or to request support: