Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Error code 800CCC78

Error code
Access Denied


In most cases, this error is reported by email clients such as Outlook. A typical message would be: 'Sending and Receiving reported error (0x800ccc78). Unable to send the message. Please verify the e-mail address in your account properties. The server responded: 5.0.0. access denied".
The first step would be to verify the credentials used to authenticate with the email (SMTP) server. Most ISPs require now all the clients to authenticate before using their SMTP server to relay email messages.

Some support forums describe this error as being recorded when there were more than one email account configured for the email client and one of them was affecting the proper authentication against the SMTP server.

M296161 describes a situation of this error being recorded when you attempt to send a message through a Mindspring Simple Mail Transfer Protocol (SMTP) server. This is caused by the fact that the Mindspring SMTP server is only accepting SMTP traffic through dialup.

For AOL customers, you may be seeing the message "Error: 0x800CCC78 The message could not be sent because the server rejected the sender's e-mail address" while using an external e-mail program because the program is using an invalid port to send e-mail.


Keywords: error code 0x800CCC78 and SMTP: Google - Bing - Microsoft - Yahoo

Keywords: Access Denied: Google - Bing - Microsoft - Yahoo

If you have additional details about this error code, please send it to us

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.