ANAVEM
Reference
Languagefr
How to Fix 550 5.1.10 RESOLVER.ADR.RecipientNotFound Error in Exchange Server

How to Fix 550 5.1.10 RESOLVER.ADR.RecipientNotFound Error in Exchange Server

Resolve Exchange Server's recipient validation error that blocks email delivery to valid recipients when invalid addresses are included in multi-recipient messages.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 17, 2026 12 min 6
hardexchange-server 9 steps 12 min

What Causes the 550 5.1.10 RESOLVER.ADR.RecipientNotFound Error?

The 550 5.1.10 RESOLVER.ADR.RecipientNotFound error is one of the most frustrating issues Exchange administrators encounter. This error occurs when Exchange Server's recipient validation feature rejects messages containing non-existent recipients, even when the message also includes valid recipients. The problem becomes particularly acute in multi-recipient scenarios where one invalid email address causes the entire message to be rejected, preventing delivery to legitimate recipients.

How Does Exchange Server Recipient Validation Work?

Exchange Server uses the Recipient Filter Agent as part of its anti-spam protection to validate recipients against Active Directory before accepting messages. When recipient validation is enabled, Exchange performs an LDAP lookup for each recipient in the message. If any recipient cannot be found in the directory, the entire message is rejected with the 550 5.1.10 error code. This behavior is designed to prevent backscatter and reduce spam, but it can interfere with legitimate business communications.

Why Is This Error More Common in Exchange 2016 and 2019?

Modern Exchange versions have enhanced anti-spam capabilities that are more aggressive in recipient validation compared to earlier versions. The Recipient Filter Agent is now enabled by default in many configurations, and the validation logic has become stricter. Organizations migrating from older Exchange versions or implementing new anti-spam policies often encounter this error when their mail flow patterns don't align with the new validation requirements. Understanding how to properly configure recipient filtering is essential for maintaining reliable email delivery while preserving security benefits.

Related: KB5074992 — Security Update for Microsoft Exchange Server

Related: How to Fix Outlook Password Prompts When Connecting to

Related: How to Fix DNS Server Not Responding Error in Windows 10

Implementation Guide

Full Procedure

01

Verify Current Transport Agent Configuration

First, check if the Recipient Filter Agent is installed and enabled on your Exchange server. This agent is responsible for recipient validation and is often the source of the 550 5.1.10 error.

Open Exchange Management Shell as an administrator and run:

Get-TransportAgent | Where-Object {$_.Name -like "*Recipient*"}

Look for the "Recipient Filter Agent" in the output. Note its status (Enabled/Disabled) and priority number.

Verification: The command should return details about the Recipient Filter Agent. If nothing appears, the anti-spam agents aren't installed.

Pro tip: Use Get-TransportAgent | Format-Table Name, Enabled, Priority to see all transport agents in a clean table format.
02

Install Anti-Spam Agents if Missing

If the Recipient Filter Agent isn't present, you need to install the anti-spam agents. This is required on all Mailbox servers, not just Edge Transport servers.

Run the installation script from the Exchange installation directory:

& $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1

The script will install multiple anti-spam agents including the Recipient Filter Agent. Wait for the installation to complete.

After installation, restart the Exchange Management Shell and verify the agents are installed:

Get-TransportAgent

Verification: You should now see multiple anti-spam agents listed, including "Recipient Filter Agent", "Sender Filter Agent", and others.

Warning: Installing anti-spam agents requires a restart of the Microsoft Exchange Transport service, which will briefly interrupt mail flow.
03

Enable the Recipient Filter Agent

Now enable the Recipient Filter Agent to allow configuration of recipient validation settings:

Enable-TransportAgent "Recipient Filter Agent"

Set the priority to ensure it processes messages at the correct stage:

Set-TransportAgent "Recipient Filter Agent" -Priority 5

Check the current recipient filter configuration:

Get-RecipientFilterConfig | Format-List

Pay attention to the RecipientValidationEnabled property - this is likely set to $true and causing your 550 5.1.10 errors.

Verification: Run Get-TransportAgent "Recipient Filter Agent" to confirm it shows as "Enabled" with Priority 5.

04

Configure Accepted Domains for Address Book Lookup

Ensure your accepted domains are configured to use Address Book lookup for recipient validation. Replace 'yourdomain.com' with your actual domain name:

Get-AcceptedDomain

For each domain that should validate recipients against Active Directory:

Set-AcceptedDomain "yourdomain.com" -AddressBookEnabled $true

If you have multiple domains, repeat this for each one:

Get-AcceptedDomain | ForEach-Object { Set-AcceptedDomain $_.Name -AddressBookEnabled $true }

Verify the configuration:

Get-AcceptedDomain | Format-Table Name, AddressBookEnabled

Verification: All your domains should show AddressBookEnabled: True in the output.

Pro tip: Only enable AddressBookEnabled for domains where you want recipient validation. External relay domains should typically have this disabled.
05

Disable Recipient Validation to Fix Multi-Recipient Issues

This is the key step to resolve the 550 5.1.10 error for multi-recipient messages. When recipient validation is enabled, Exchange rejects the entire message if any recipient is invalid, even if other recipients are valid.

Disable recipient validation:

Set-RecipientFilterConfig -RecipientValidationEnabled $false

Alternatively, if you want to keep some validation but allow multi-recipient messages with mixed valid/invalid recipients, you can configure blocked recipients instead:

Set-RecipientFilterConfig -BlockedRecipients @("blocked@yourdomain.com", "spam@yourdomain.com")

View the updated configuration:

Get-RecipientFilterConfig | Format-List RecipientValidationEnabled, BlockedRecipients

Verification: The output should show RecipientValidationEnabled: False.

Warning: Disabling recipient validation means Exchange will accept mail for non-existent recipients, which may increase backscatter and NDR generation.
06

Configure Alternative Recipient Filtering Options

Instead of completely disabling recipient validation, you can configure more granular filtering options that still allow legitimate multi-recipient messages:

Enable recipient lookup but disable validation rejection:

Set-RecipientFilterConfig -RecipientValidationEnabled $false -BlockListEnabled $true

Configure specific blocked recipients or domains:

Set-RecipientFilterConfig -BlockedRecipients @("noreply@*", "postmaster@spam.com")

Set up recipient lookup timeout to prevent delays:

Set-RecipientFilterConfig -RecipientValidationEnabled $true -BlockListEnabled $false

For organizations that need validation but want to handle multi-recipient scenarios gracefully, consider enabling validation with custom rejection responses:

Set-RecipientFilterConfig -RecipientValidationEnabled $true -RejectionResponse "Recipient not found in directory"

Verification: Test with Get-RecipientFilterConfig | Format-List to confirm all settings are applied correctly.

07

Restart Exchange Transport Services

Transport agent configuration changes require restarting the Microsoft Exchange Transport service to take effect:

Restart-Service MSExchangeTransport -Force

Monitor the service restart:

Get-Service MSExchangeTransport

Wait for the service to show "Running" status. Also restart the Front End Transport service if you're running Exchange 2016/2019:

Restart-Service MSExchangeFrontEndTransport -Force

Check the transport service logs for any errors during startup:

Get-EventLog -LogName Application -Source "MSExchange*" -Newest 10

Verification: Both transport services should show "Running" status, and no critical errors should appear in the event logs.

Pro tip: Schedule transport service restarts during maintenance windows as they briefly interrupt mail flow.
08

Test Email Delivery with Mixed Recipients

Create a test scenario to verify the 550 5.1.10 error is resolved. Send a test email to multiple recipients including both valid and invalid addresses.

Use PowerShell to send a test message:

Send-MailMessage -From "test@yourdomain.com" -To "valid@yourdomain.com", "invalid@yourdomain.com" -Subject "Multi-recipient test" -Body "Testing recipient validation fix" -SmtpServer "your-exchange-server.yourdomain.com"

Monitor the message tracking logs:

Get-MessageTrackingLog -Start (Get-Date).AddMinutes(-10) -Sender "test@yourdomain.com" | Format-Table Timestamp, EventId, Recipients, MessageSubject

Check for delivery to valid recipients and proper handling of invalid ones:

Get-Queue | Where-Object {$_.MessageCount -gt 0}

Verification: Valid recipients should receive the email, and you should not see 550 5.1.10 errors in the message tracking logs. Invalid recipients may generate NDRs, but valid ones should deliver successfully.

09

Monitor and Fine-tune Configuration

After implementing the fix, monitor your Exchange server for any unintended consequences and fine-tune the configuration as needed.

Set up monitoring for NDR generation:

Get-MessageTrackingLog -EventId "FAIL" -Start (Get-Date).AddHours(-1) | Group-Object Recipients | Sort-Object Count -Descending

Review recipient filter statistics:

Get-TransportServer | Get-MessageTrackingLog -EventId "AGENTINFO" -Start (Get-Date).AddHours(-24) | Where-Object {$_.Source -eq "AGENT"} | Group-Object EventId

If you notice increased spam or backscatter, consider re-enabling validation with exceptions:

Set-RecipientFilterConfig -RecipientValidationEnabled $true -BlockedRecipients @("common-typos@yourdomain.com")

Create a scheduled task to regularly review recipient filter effectiveness:

$ScriptBlock = { Get-RecipientFilterConfig | Out-File "C:\Logs\RecipientFilter-$(Get-Date -Format 'yyyyMMdd').log" }
Register-ScheduledJob -Name "RecipientFilterMonitoring" -ScriptBlock $ScriptBlock -Trigger (New-JobTrigger -Daily -At "06:00")

Verification: Monitor mail flow for 24-48 hours to ensure the fix doesn't introduce new issues. Valid multi-recipient messages should deliver successfully without 550 5.1.10 errors.

Pro tip: Keep detailed logs of your configuration changes and their impact on mail flow for future troubleshooting and compliance audits.

Frequently Asked Questions

What exactly is the 550 5.1.10 RESOLVER.ADR.RecipientNotFound error in Exchange Server?+
This error occurs when Exchange Server's Recipient Filter Agent cannot validate one or more recipients in an email message against Active Directory. The error code 550 indicates a permanent failure, 5.1.10 specifically refers to recipient address resolution failure, and RESOLVER.ADR.RecipientNotFound means the recipient lookup failed. When recipient validation is enabled, Exchange rejects the entire message if any recipient cannot be found in the directory, even if other recipients in the same message are valid.
Why does Exchange reject the entire message when only one recipient is invalid?+
Exchange Server's recipient validation works at the message level, not per-recipient. When the Recipient Filter Agent is enabled with RecipientValidationEnabled set to true, it performs LDAP lookups for all recipients before accepting the message. If any recipient fails validation, Exchange considers the entire message suspicious and rejects it with a 550 error. This behavior is designed to prevent backscatter attacks and reduce spam, but it can interfere with legitimate multi-recipient communications where typos or outdated addresses are included.
Is it safe to disable recipient validation to fix the 550 5.1.10 error?+
Disabling recipient validation has security trade-offs that must be carefully considered. While it resolves the 550 5.1.10 error and allows multi-recipient messages to deliver to valid recipients, it also means Exchange will accept mail for non-existent recipients. This can increase backscatter, generate more NDRs, and potentially allow more spam through. A better approach is often to use granular recipient filtering with blocked recipient lists or configure custom rejection responses while keeping some level of validation active.
How do I verify that my Exchange Server recipient filter configuration is working correctly?+
Use the Get-RecipientFilterConfig PowerShell cmdlet to check current settings, particularly the RecipientValidationEnabled property. Test with multi-recipient messages containing both valid and invalid addresses, then monitor message tracking logs using Get-MessageTrackingLog to see delivery results. Check transport queues with Get-Queue to identify any stuck messages. Also verify that accepted domains have AddressBookEnabled set appropriately using Get-AcceptedDomain. Regular monitoring of NDR generation and spam levels will help you balance security with deliverability.
What's the difference between recipient validation and recipient filtering in Exchange Server?+
Recipient validation is the process of checking if recipients exist in Active Directory before accepting messages, controlled by the RecipientValidationEnabled parameter. Recipient filtering is a broader anti-spam feature that can block specific recipients, domains, or patterns using blocked recipient lists, controlled by parameters like BlockedRecipients and BlockListEnabled. You can have recipient filtering active with validation disabled, allowing you to block known bad addresses while still accepting messages for non-existent recipients. This provides a middle ground between complete validation and no filtering at all.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...