Messages delivered locally to the same domain on a Windows Server behind NAT are being marked as SPAM by SpamAssassin.
The following records can be found in mail headers:
* 2.4 RDNS_NONE Delivered to internal network by a host with no rDNS
* 2.5 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
This is expected behavior. Messages are being sent and received using internal network IP address, which has not published reverse DNS record, and the domain name for sender and recipient is the same.
In order to disable these filters, perform the following:
Connect to the server via RDP.
"%plesk_dir%AdditionalSpamAssassinetcmailspamassassinlocal.cf"file and add the following lines:
score RDNS_NONE 0
score TO_EQ_FM_DIRECT_MXR 0
Restart mail services using Plesk Services Monitor.
As an alternative solution, use “trusted_networks” directive.
A detailed description may be found in official documentation.
trusted_networks 192.168/16 127/8 # all in 192.168.. and 127...*
trusted_networks 126.96.36.199 # just that host
trusted_networks 127. # all in 127...*