SlideShare a Scribd company logo
1 of 4
Download to read offline
GFI White Paper

     Greylisting:
 Decrease junk mail,
increase productivity
Contents
                   The basic premise                     3
                   How greylisting works                 3
                   Impact on mail flow                   3
                   Enabling greylisting                  3




Greylisting: Decrease junk mail, increase productivity       2
The goal of GFI MailEssentials Complete Online™ is to improve business productivity by reducing the volume of
junk mail and time spent managing it. Achieving this goal is akin to duplicating what email users experienced
back in 1994-95, when almost all email messages were ‘legitimate’ and extremely little time or effort was spent
dealing with junk email. While MailEssentials Complete Online detects a vast majority of today’s junk email, we
are continually working on new approaches to combat the increasing sophistication of spammers and reduce
time spent managing whitelists and blacklists, reviewing quarantines and digests and other tasks. Greylisting is
one of the ways MailEssentials Complete Online reduces junk mail and saves you time.

The basic premise
The concept is simple. The first time a given mailbox receives a message from a given sender, we respond
to the sending mail server with a temporary rejection message, asking the server to try again. (This happens
during the SMTP conversation and is transparent to end-users.) With legitimate email, the sending mail server
tries again a few minutes later, at which time we accept the message. Most spam messages are sent using
software that will not retry the delivery. These messages will never arrive in MailEssentials Complete Online’s
quarantine or the user’s inbox. With Greylisting, you’ll save valuable time once spent scanning the quarantine,
daily digest or a user’s spam folder thanks to a greatly reduced volume of spam messages.

How greylisting works
For each incoming message, three elements are examined in the early part of the SMTP conversation: the
sender IP address, the sender email address and the recipient email address. If this is the first time this email
‘relationship’ has been identified, a temporary deferral message is issued to the sending mail server − before
the DATA portion of the email is sent. That relationship is then “greylisted.”
If or when within a finite time period that same set of sender IP address, sender email address and recipient
email address is seen again – as would be expected with any legitimate email – the combination is
“whitelisted”, so that the message, as well as future messages with that relationship, are accepted immediately,
without temporary deferral. The whitelisting remains in place for upwards of a month.
After a message passes through the greylisting, it’s processed as usual. Any spam message that is greylisted
and re-tried will be subjected to the same stringent message analysis techniques as in cases where greylisting
is not used.
GFI Software conducted a greylisting test of one million messages and found that less than 75,000 spam
messages were retried – meaning over 90% of junk mail was blocked by greylisting alone.

Impact on mail flow
Greylisting by its nature can introduce delays in message flow, but these delays are generally brief and non-
recurring for a given recipient-sender combination.
The length of delay is dependent on how long a sending mail server waits before re-sending a message.
While a few sending mail servers – typically those used for high-volume mailings – will have a relatively long
retry interval of an hour or more, most mail servers will automatically re-send a temporarily deferred message
in 15 minutes or less.
Additionally, since the email ‘relationship’ described above (sender IP address, sender email address, and
recipient email address) is whitelisted after a single temporary deferral, there should be no subsequent delays
after that initial message.
Last but not least, any sender addresses that are whitelisted by a user or domain administrator are not greylisted.

Enabling greylisting
Greylisting can be enabled or disabled at any time on a domain-wide basis, via the MailEssentials Complete
Online control panel.




Greylisting: Decrease junk mail, increase productivity                                                              3
USA, CANADA AND CENTRAL AND SOUTH AMERICA




                                                                                                                                                                                               GFI 2412 oct11
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA
Telephone: +1 (888) 688-8457
Fax: +1 (727) 562-5199
ussales@gfi.com



UK AND REPUBLIC OF IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE, MIDDLE EAST AND AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA AND NEW ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com


For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

More Related Content

Similar to Email Continuity

How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian MailHelp Now, LLC
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology featuresShweta Jain
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email SecureShawn Jordan
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfBalaramaRaju2
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)webhostingguy
 
Top 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorTop 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorThomas Donofrio
 
10 ways mail can help you prosper in a gdpr world infographic
10 ways mail can help you prosper in a gdpr world   infographic10 ways mail can help you prosper in a gdpr world   infographic
10 ways mail can help you prosper in a gdpr world infographicAndy Hawkins
 
Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Digital Wavefront
 
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...HandySends
 

Similar to Email Continuity (20)

How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian Mail
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
Greylisting
GreylistingGreylisting
Greylisting
 
Email bagging
Email baggingEmail bagging
Email bagging
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology features
 
Message Flow
Message FlowMessage Flow
Message Flow
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email Secure
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdf
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
MessageFlow
MessageFlowMessageFlow
MessageFlow
 
AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)
 
The Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email MarketingThe Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email Marketing
 
Top 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorTop 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag Accelerator
 
10 ways mail can help you prosper in a gdpr world infographic
10 ways mail can help you prosper in a gdpr world   infographic10 ways mail can help you prosper in a gdpr world   infographic
10 ways mail can help you prosper in a gdpr world infographic
 
Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery
 
NEDMA14: Creating Email Awesomeness! - Nirmal Parikh
NEDMA14: Creating Email Awesomeness! - Nirmal ParikhNEDMA14: Creating Email Awesomeness! - Nirmal Parikh
NEDMA14: Creating Email Awesomeness! - Nirmal Parikh
 
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
 

More from GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Binary translation
Binary translationBinary translation
Binary translationGFI Software
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI Software
 

More from GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Binary translation
Binary translationBinary translation
Binary translation
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment Strategies
 

Recently uploaded

Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTopCSSGallery
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2DianaGray10
 

Recently uploaded (20)

Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development Companies
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2
 

Email Continuity

  • 1. GFI White Paper Greylisting: Decrease junk mail, increase productivity
  • 2. Contents The basic premise 3 How greylisting works 3 Impact on mail flow 3 Enabling greylisting 3 Greylisting: Decrease junk mail, increase productivity 2
  • 3. The goal of GFI MailEssentials Complete Online™ is to improve business productivity by reducing the volume of junk mail and time spent managing it. Achieving this goal is akin to duplicating what email users experienced back in 1994-95, when almost all email messages were ‘legitimate’ and extremely little time or effort was spent dealing with junk email. While MailEssentials Complete Online detects a vast majority of today’s junk email, we are continually working on new approaches to combat the increasing sophistication of spammers and reduce time spent managing whitelists and blacklists, reviewing quarantines and digests and other tasks. Greylisting is one of the ways MailEssentials Complete Online reduces junk mail and saves you time. The basic premise The concept is simple. The first time a given mailbox receives a message from a given sender, we respond to the sending mail server with a temporary rejection message, asking the server to try again. (This happens during the SMTP conversation and is transparent to end-users.) With legitimate email, the sending mail server tries again a few minutes later, at which time we accept the message. Most spam messages are sent using software that will not retry the delivery. These messages will never arrive in MailEssentials Complete Online’s quarantine or the user’s inbox. With Greylisting, you’ll save valuable time once spent scanning the quarantine, daily digest or a user’s spam folder thanks to a greatly reduced volume of spam messages. How greylisting works For each incoming message, three elements are examined in the early part of the SMTP conversation: the sender IP address, the sender email address and the recipient email address. If this is the first time this email ‘relationship’ has been identified, a temporary deferral message is issued to the sending mail server − before the DATA portion of the email is sent. That relationship is then “greylisted.” If or when within a finite time period that same set of sender IP address, sender email address and recipient email address is seen again – as would be expected with any legitimate email – the combination is “whitelisted”, so that the message, as well as future messages with that relationship, are accepted immediately, without temporary deferral. The whitelisting remains in place for upwards of a month. After a message passes through the greylisting, it’s processed as usual. Any spam message that is greylisted and re-tried will be subjected to the same stringent message analysis techniques as in cases where greylisting is not used. GFI Software conducted a greylisting test of one million messages and found that less than 75,000 spam messages were retried – meaning over 90% of junk mail was blocked by greylisting alone. Impact on mail flow Greylisting by its nature can introduce delays in message flow, but these delays are generally brief and non- recurring for a given recipient-sender combination. The length of delay is dependent on how long a sending mail server waits before re-sending a message. While a few sending mail servers – typically those used for high-volume mailings – will have a relatively long retry interval of an hour or more, most mail servers will automatically re-send a temporarily deferred message in 15 minutes or less. Additionally, since the email ‘relationship’ described above (sender IP address, sender email address, and recipient email address) is whitelisted after a single temporary deferral, there should be no subsequent delays after that initial message. Last but not least, any sender addresses that are whitelisted by a user or domain administrator are not greylisted. Enabling greylisting Greylisting can be enabled or disabled at any time on a domain-wide basis, via the MailEssentials Complete Online control panel. Greylisting: Decrease junk mail, increase productivity 3
  • 4. USA, CANADA AND CENTRAL AND SOUTH AMERICA GFI 2412 oct11 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com 33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA Telephone: +1 (888) 688-8457 Fax: +1 (727) 562-5199 ussales@gfi.com UK AND REPUBLIC OF IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.