SlideShare a Scribd company logo
1 of 28
Download to read offline
Page 1 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
DE-LIST YOUR ORGANIZATION FROM A
BLACKLIST | MY E-MAIL APPEARS AS
SPAM | PART 16#17
In the following article, we review the charters of a scenario in
which your organization appears as blacklisted.
For the avoidance of doubt – the purpose of this article is not
to provide a detailed instruction and links to the procedure of
de-listing your organization from a specific blacklist.
The purpose of the current article is – to provide the flow and
the structure of the tasks that we need to be implemented and
best practices for a scenario of internal  outbound spam.
Page 2 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
The great drama: My organization appears as
“blacklisted”!
Let’s start with a dramatic sentence: my organization appears
as “blacklisted”!
Q1: What is the meaning of: “my organization” appears as
blacklisted”?
Q2: What should I do in a scenario of: “my organization”
appears as blacklisted”?
Q3: Is there a specific charter of the scenario: “my organization
appears as blacklisted” in Office 365 and Exchange Online
environment?
The meaning of – “my organization” appears
as blacklisted
The term: ”my organization”, could be translated into one of
the four following options:
1. Public domain name
A scenario, in which your organization, public domain name
appears as blacklisted.
2. Mail server IP address
Page 3 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
A scenario, in which your mail server IP address appears as:
blacklisted.
As mentioned before – In an Office 365 and Exchange Online
environment, the scenario in which your “formal Exchange
Online IP address” appears as blacklisted is very rare.
The most common scenario is a scenario in which that the IP
address that appear as “blacklisted”, belong to the “special
Exchange Online servers” that are classified as: “Higher Risk
Delivery Pool”.
3. Specific E-mail message content
A scenario in which a specific E-mail message will be blocked
because the content of the E-mail message. In this case, it’s
not clear if the “spam filter” decides to block also the recipient
who sent out the E-mail, the specific mail server that sent out
the E-mail or, the complete domain name that is a part of the
recipient E-mail address.
4. E-mail address of a specific recipient organization
The scenario in which the “issue” relates to a specific
organization E-mail address is less common. In this scenario, a
specific organization’s recipient is blacklisted.
Page 4 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
The optional scenario for “blacklisted” and
their level of severity.
A scenario in which mail that was sent by one of our
organization users identified as spam mail and for this reason,
blocked by the destination mail server or, sent to the junk mail
folder as the destination external recipient, is not a desirable
scenario.
The main question in this scenario is not if this scenario is
desirable or not, but instead – what is the “factor”, that the
destination mail infrastructure use for identifying the E-mail
that was sent by one of our origination users as a spamJunk
mail.
Page 5 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
Option 1: the organization domain name is
blacklisted.
The “less preferred scenario” is – the scenario in which our
domain name appears as Blacklisted.
This type of scenario described as: “less preferred” because, in
this case, the “guilt” is upon the organization domain name. In
this scenario, all of the organization users are affected and not
only to a specific organization user.
The problem in which the mail that is sent from our
origination is identified as spamJunk mail is not related only
to a specific “event” or a specific mail item that includes
specific content but instead, to all the “outbound mail flow” of
our organization users.
In the following diagram, we can see an example of this
concept.
Page 6 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
The cause of the problem is the Office 365 recipient domain
name (the “right part” of the E-mail address). The destination
mail server “refuse” to accept the E-mail message not because
there is a problem with the E-mail message content but
because – the E-mail message sent from a domain name that
appears as blacklisted.
In this type of scenario in which our organization domain
name appears on a blacklisted, we will need to contact the
“blacklist provider” and ask him to be removed (remove our
domain name) from the blacklist.
Option 2: mail server IP address is blacklisted.
The severity of this scenario depends on the specific mail
infrastructure that we use.
Page 7 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
Non-Office 365 and Exchange Online mail infrastructure
In case that your mail infrastructure is not based on the Office
365 and Exchange Online mail infrastructure, a scenario in
which your mail server appears as blacklisted, consider also as
critical scenario.
The level of the “criticality” depends on the structure of your
mail infrastructure.
In case that your organization has only one mail server, the
“critical level” is very high because, all the organization mail is
Page 8 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
sent via a specific mail server and in case that this mail server
is blacklisted, this is a major problem.
In case that the organization mail infrastructure is based on
more than one mail server, the “critical level” is less severe
because – there is an option to route all the rest of the
organizational E-mail messages via the additional organization
mail servers, until the problem with the specific mail server will
be resolved.
Office 365 and Exchange Online mail infrastructure
In Office 365 and Exchange Online the organization is
represented by the Exchange Online server and in a very
specific scenario, in case that the E-mail message that was
sent by the Office 365 users identified as spamJunk mail by
the EOP (Exchange Online protection) the specific E-mail
message will be routed via the Exchange Online High Risk
Delivery Pool.
The scenario in which the “formal Exchange Online” IP address
that represent the organization will appear is blacklisted is
very rare.
The more likely scenario, is that in case that the E-mail
message was sent via the Exchange Online High Risk Delivery
Pool, the destination mail server will reject the E-mail message
and notify us that “our mail server” is blacklisted.
In this scenario, the “guilt” is alleged upon the Exchange Online
Higher Risk Delivery Pool.
Page 9 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part
16#17
Written by Eyal Doron | o365info.com
Office 365 spam filters, recognize that the office365 users try
to send out an E-mail message that consider as “problematic”.
To avoid from a scenario in which all the organizations will be
“stamped” as “problematic”, the specific E-mail message is
routed via the mail server that was created for this type of E-
mail messages – the Exchange Online Higher Risk Delivery
Pool.
The basic assumption is that some of the IP address that are
used by the Exchange Online- High Risk Delivery Pool, is
already listed in some blacklists.
Conclusion
Page 10 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
In Office 365 and Exchange Online environment the scenario
which we describe as: “my mail server appears as blacklisted”,
does not lead to the conclusion that the problem is related to
the “Office 365 mail server”.
Instead, the problem is related to the “element” to a specific
Office 365 user and to a specific E-mail message content,
which was sent by the Office 365 users, identified as spam by
the EOP and routed via the Exchange Online- High Risk
Delivery Pool.
The cause of the problem is a specific E-mail content to “lead”
into a scenario in which the E-mail message sent via the
Exchange Online Higher Risk Delivery Pool.
The “other side” classifies the E-mail message as spamJunk
mail, but this “classification” relates only to the specific session
and only to the specific E-mail message.
In case that the Office 365 recipients will send a new E-mail
message that doesn’t contain a problematic content, most of
the chances that the E-mail message will successfully be sent
to the destination external recipient.
Option 3: a specific E-mail address (organization user)
is blacklisted.
This scenario could be realized, however, this scenario is less
common. In some cases, the spam filter is listing a very
specific E-mail address and not relate to the “whole domain
part”.
Page 11 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
What do I need to do for getting “de-listed”
from a blacklist?
Technically speaking, there are two ways in which your
organization will be removed from a specific blacklist:
1. Self-service removal
A a process in which an organization representative should fill
a request form, in which he asks to be de-listed from the
blacklist and, lists the reason or explanations for his request.
In simple words: the organization representative, should
explain why his organization was recognized as an “element”
the distribute spam mail by mistake.
2. Time-Based Removal
Some of the blacklist provider implements an automatic
mechanism in which the domain name or the IP address of the
domain that was registered at the blacklist, will be removed
automatically after a specific time period.
In simple words: if the origination will not make any more
additional problem and, act as a “good boy” the reward is that
– his detailed will be removed from the blacklist.
The problem is that we as an organization, have no control
over the process.
Page 12 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
“De-list” checklist, from a blacklist
Yes, I know that this heading sounds a bit funny.
Verify that you understand the following parts and can answer
the following questions:
The problem scope
Q: Did your organization is blacklisted by a specific blacklist or,
by a couple of blacklist providers?
A: The first and most important steps is to verify, what the
scope of the problem: does your organization appear as
blacklisted in a very specific blacklist or a couple of blacklists.
You can get a quick answer to this question by using online
services that will help you to check multiple blacklist providers
from one place.
You can read more detailed information in the article: My E-
mail appears as spam | Troubleshooting – Mail server | Part
15#17
Your organization mail infrastructure details
Q: When we say: “our organization is blacklisted” are you fully
understand the meaning?
Q: Does your domain name is blacklisted?
Page 13 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Q: Does your mail server is blacklisted?
Q: If you have more, then one mail server, do you have a list of
all the existing mail servers who represent your organization?
Q: When you check for information about a scenario in which
your mail server is blacklisted, and you have more than one
mail server, did you check if the additional mail servers IP
address appears as blacklisted?
A: Before you start the “de-list procedure” verify that you have
all the required information in front of you.
The reasons that lead us to the scenario.
Q: Can you speculate regarding the reasons that lead us to the
scenario in which your organization appears as blacklisted?
Q: Do you think that the “root cause” of the problem is related
to: bulk mail, to a specific E-mail message content? To a
specific user?
A: There is no point investing all efforts and energy in the “de-
list” process and hoping to get “de-listed if the “element” that
causes for this problem continue the specific behavior.
Page 14 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Implement your due diligence
You find out that your organization appears as blacklisted in a
specific blacklist. You feel the appearance of the bitterness
emotional and the question that appears: why did you do such
a thing?
Before we are pointing our finger to the “element that blacked
listed” our organization and causes us grief, let’s take a
moment and verify if this is a classic scenario of false-positive
meaning: our legitimate E-mail was recognized as spamjunk
mail by a mistake or….Maybe there is a reason that leads to
the unwanted scenario, in which our organization appears as
blacklisted.
The reason for implementing this: “due diligence” is – that in a
scenario which we indeed have a problem because we use a
commercial mail that violates a common standard, we will
Page 15 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
continue to have problems not only with a specific blacklist
provider but with many others.
Is “easy” to get on a blacklist, but the process of “getting out”
from a blacklist is not easy.
An additional issue is our “integrity”. Before we are sending
the request to be “removed from the blacklist” and we commit
that – the process in which our mail infrastructure was
classified as “problematic” is a mistake (false positive), I think
that is fair to implement a little investigation and try to verify if
our organization “do something” that lead us to a scenario in
which “others” identified E-mail message that is sent from our
organization as spamjunk mail.
Page 16 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Ask to be removed (de-list) from a blacklist
In a scenario in which our organization mail infrastructure
appears as blacklisted in a “well know blacklist providers”, it’s
obvious that the only thing that we want is – to immediately be
excluded from the blacklist because, the outcome is a serious
disruption of our business activity.
In a perfect world, we will have to say specific magic words
and… the problem will despair in two (or maybe 4) seconds.
In the real world, the process is not so easy!
Page 17 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Blacklist providers as Black box
I relate to the subject of – blacklist providers as a “Black box”
because, the “vague nature” of the blacklist providers.
The main excuse for this “ambiguity”, is maybe the “security
argument” which is used to explain why there is no option for
providing a detailed information about the reason that a
specific domain name or specific IP address of the mail server
was added to a blacklist.
My opinion is that the “security argument” is not strong
enough to answer additional questions and requirement such
as – the ability to get a formal response from the blacklist
providers.
For example – approval that he got our request, update
Page 18 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
notification that will inform us if the de-list request was
complete successfully or not, etc.
I know that this could be considered as a “generalization” and I
am sure that there are significant differences between the
different “blacklist providers” but, from my experience, the
contrast between the business need to – urgently solve a
problem in which the organization domain name appears in a
blacklist verses the difficulty to get a response from “blacklist
providers” could be very frustrating.
4 reasons for relating to “blacklist
providers” as a Black box
In a scenario in which your organization appears a blacklisted,
there are a couple of “parts” that are responsible for the
“uncertainty” of the process.
Page 19 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
1. The reason for adding your domain name mail server IP
address
The Inability to get information about the specific reasons
that leads to the outcome in which our organization is
blacklisted. The reason for ambiguity is that each of the
“blacklist providers”, keeps in secret the algorithm and the
methods, that he uses for identifying a specific E-mail item or
specific organization as “entity” that sends spamjunk mail.
2. The formal way to implement a “de-list process”
Some of the “blacklist providers”, provide a very clear guide
about how to implement the process of “asking to be removed
from a blacklist” and some are not. I have also seen scenarios
in which the specific “blacklist providers” request money for
implementing the process of the “de-list”.
3. A contact person
Most of the “blacklist providers” will not provide a phone
number, an E-mail address of a contact person.
The logic that is implemented by most of the “blacklist
providers” is:
 Fill in the request form, in which you ask to remove your
organization name from the blacklist.
 We will read your request.
 Perform different checks
Page 20 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
 If we decide that you are “entitled” to be removed from the
blacklist, we will remove the information about your organization
from the blacklist.
4. Formal response
The section is based on the concept of “section 3”. Most of the
“blacklist providers”, will not send an “update or a notification
E-mail” in case that they decide to remove your organization
from the blacklist. The responsibility for checking and verifying
that your request to be de-list was “approved”, is your
responsibility!
You will need to access the “blacklist provider” website and re-
check the information about your status.
Conclusions
1. Implement all the best practices and the preventive actions that
you help your to avoid a future scenarios, in which your
organization appears as blacklisted.
2. Try to get all the available information about the process or the
procedure of de- listing your organization from the specific
blacklist provider.
Page 21 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
3. Take a deep breath, carry your eyes to the sky and hope for the
best!
4. After you complete the de-list process, access the website of the
“blacklist provider” and verify if your organization still appears as
blacklisted.
5. Let’s assume that there was a reason for adding your
organization to a blacklist and let’s assume that the “blacklist
provider” was kind enough to remove your origination from the
blacklist. Verify that you “fix” all the issues that lead to the
problem in the first time. Don’t make the same mistake again
because if the “next time” occurs, the blacklist providers will be
less forgiving.
Page 22 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Additional reading
 Request that a user, domain, or IP address be removed
from a block list after sending outbound spam
 Getting delisted by Microsoft
delist@messaging.microsoft.com
 How to Check Microsoft’s Blacklist
 Request a delisting from a blacklist
 blocked using Blocklist 1; To request removal from this list
please forward this message to
delist@messaging.microsoft.com
 Help and support for EOP
Internal  outbound spam in Office 365
environment | Article series index
A quick reference for the article series
My E-mail appears as a spam | Article
series index | Part 0#17
The article index of the complete
article series
Page 23 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Introduction to the concept of internal  outbound spam in general
and in Office 365 and Exchange Online environment
My E-mail appears as a spam –
Introduction | Office 365 | Part 1#17
The psychological profile of the
phenomenon: “My E-mail appears as
a spam!”, possible factors for causing
our E-mail to appear a “spam mail”,
the definition of internal  outbound
spam.
Internal spam in Office 365 –
Introduction | Part 2#17
Review in general the term: “internal 
outbound spam”, miss conceptions
that relate to this term, the risks that
are involved in this scenario,
outbound spam E-mail policy and
more.
Internal spam in Office 365 –
Introduction | Part 3#17
What are the possible reasons that
could cause to our mail to appear as
spamjunk mail, who or what are this
“elements”, that can decide that our
mail is a spam mail?, what are the
possible “reactions” of the destination
mail infrastructure that identify our E-
mail as spamjunk mail?.
Page 24 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Commercial E-mail – Using the right
tools | Office 365 | Part 4#17
What is commercial E-mail?
Commercial E-mail as part of the
business process. Why do I think that
Office 365 Exchange Online is
unsuitable for the purpose of
commercial E-mail?
Introduction if the major causes for a scenario in which your
organization E-mail appears as spam
My E-mail appears as spam | The 7
major reasons | Part 5#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
1. E-mail content, 2. Violation of the
SMTP standards, 3. BulkMass mail
My E-mail appears as spam | The 7
major reasons | Part 6#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
4. False positive, 5. User Desktop
malware, 6. “Problematic” Website
Page 25 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
Introduction if the subject of SPF record in general and in Office
365 environment
What is SPF record good for? | Part
7#17
The purpose of the SPF record and the
relation to for our mail infrastructure.
How does the SPF record enable us to
prevent a scenario in which hostile
elements could send E-mail on our
behalf.
Implementing SPF record | Part 8#17
The “technical side” of the SPF record:
the structure of SPF record, the way
that we create SPF record, what is the
required syntax for the SPF record in
an Office 365 environment + mix mail
environment, how to verify the
existence of SPF record and so on.
Introduction if the subject of Exchange Online - High Risk Delivery
Pool
High Risk Delivery Pool and Exchange
Online | Part 9#17
How Office 365 (Exchange Online) is
handling a scenario of internal 
outbound spam by using the help of
the Exchange Online- High Risk
Delivery Pool.
Page 26 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
High Risk Delivery Pool and Exchange
Online | Part 10#17
The second article about the subject
of Exchange Online- High Risk
Delivery Pool.
The troubleshooting path of internal  outbound spam scenario
My E-mail appears as spam –
Troubleshooting path | Part 11#17
Troubleshooting scenario of internal 
outbound spam in Office 365 and
Exchange Online environment.
Verifying if our domain name is
blacklisted, verifying if the problem is
related to E-mail content, verifying if
the problem is related to specific
organization user E-mail address,
moving the troubleshooting process
to the “other side.
My E-mail appears as spam |
Troubleshooting – Domain name and
E-mail content | Part 12#17
Verify if our domain name appears as
blacklisted, verify if the problem
relates to a specific E-mail message
content, registering blacklist
monitoring services, activating the
Page 27 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
option of Exchange Online outbound
spam.
My E-mail appears as spam |
Troubleshooting – Mail server | Part
13#17
What is the meaning of: “our mail
server”?, Mail server IP, host name
and Exchange Online. One of our
users got an NDR which informs him,
that his mail server is blacklisted!,
How do we know that my mail server
is blacklisted?
My E-mail appears as spam |
Troubleshooting – Mail server | Part
14#17
The troubleshooting path logic. Get
the information from the E-mail
message that was identified as
spamNDR. Forwarding a copy of the
NDR message or the message that
saved to the junk mail
My E-mail appears as spam |
Troubleshooting – Mail server | Part
15#17
Step B – Get information about your
Exchange Online infrastructure, Step
C – fetch the information about the
Exchange Online IP address, Step D –
verify if the “formal “Exchange Online
IP address a
Page 28 of 28 | De-list your organization from a blacklist | My E-mail appears as spam |
Part 16#17
Written by Eyal Doron | o365info.com
De-list your organization from a
blacklist | My E-mail appears as spam
| Part 16#17
Review the charters of a scenario in
which your organization appears as
blacklisted. The steps and the
operations that need to be
implemented for de-list your
organization from a blacklist.
Summery and recap of the troubleshooting and best practices in a
scenario of internal  outbound spam
Dealing and avoiding internal spam |
Best practices | Part 17#17
Provide a short checklist for all the
steps and the operation that relates
to a scenario of – internal  outbound
spam.

More Related Content

Viewers also liked

OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLizso
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationpathsproject
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17Eyal Doron
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hourdesignforchangechallenge
 
TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode designforchangechallenge
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираmediamera
 
PATHS at Royal Melbourne Institute of Technology
PATHS at Royal Melbourne Institute of TechnologyPATHS at Royal Melbourne Institute of Technology
PATHS at Royal Melbourne Institute of Technologypathsproject
 
Arema connect partnership introduction
Arema connect partnership introductionArema connect partnership introduction
Arema connect partnership introductionArema Connect
 
Tgs implementing tfu story of change (dfc 2012-13)
Tgs implementing tfu   story of change (dfc 2012-13)Tgs implementing tfu   story of change (dfc 2012-13)
Tgs implementing tfu story of change (dfc 2012-13)designforchangechallenge
 
PATHS Functional specification first prototype
PATHS Functional specification first prototypePATHS Functional specification first prototype
PATHS Functional specification first prototypepathsproject
 
PATHS at the Language Technology Group, Computer Science and Software Enginee...
PATHS at the Language Technology Group, Computer Science and Software Enginee...PATHS at the Language Technology Group, Computer Science and Software Enginee...
PATHS at the Language Technology Group, Computer Science and Software Enginee...pathsproject
 
Semantic Enrichment of Cultural Heritage content in PATHS
Semantic Enrichment of Cultural Heritage content in PATHSSemantic Enrichment of Cultural Heritage content in PATHS
Semantic Enrichment of Cultural Heritage content in PATHSpathsproject
 
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 User-Centred Design to Support Exploration and Path Creation in Cultural Her... User-Centred Design to Support Exploration and Path Creation in Cultural Her...
User-Centred Design to Support Exploration and Path Creation in Cultural Her...pathsproject
 
PATHS Final state of art monitoring report v0_4
PATHS  Final state of art monitoring report v0_4PATHS  Final state of art monitoring report v0_4
PATHS Final state of art monitoring report v0_4pathsproject
 
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...pathsproject
 
PATHS Content processing 2nd prototype-revised.v2
PATHS Content processing 2nd prototype-revised.v2PATHS Content processing 2nd prototype-revised.v2
PATHS Content processing 2nd prototype-revised.v2pathsproject
 

Viewers also liked (19)

OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPL
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentation
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
 
TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode
 
Canciones del colegio
Canciones del colegioCanciones del colegio
Canciones del colegio
 
TAM-2012-13 PUPS Narayanapuram
TAM-2012-13 PUPS NarayanapuramTAM-2012-13 PUPS Narayanapuram
TAM-2012-13 PUPS Narayanapuram
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мира
 
PATHS at Royal Melbourne Institute of Technology
PATHS at Royal Melbourne Institute of TechnologyPATHS at Royal Melbourne Institute of Technology
PATHS at Royal Melbourne Institute of Technology
 
Arema connect partnership introduction
Arema connect partnership introductionArema connect partnership introduction
Arema connect partnership introduction
 
Tgs implementing tfu story of change (dfc 2012-13)
Tgs implementing tfu   story of change (dfc 2012-13)Tgs implementing tfu   story of change (dfc 2012-13)
Tgs implementing tfu story of change (dfc 2012-13)
 
PATHS Functional specification first prototype
PATHS Functional specification first prototypePATHS Functional specification first prototype
PATHS Functional specification first prototype
 
PATHS at the Language Technology Group, Computer Science and Software Enginee...
PATHS at the Language Technology Group, Computer Science and Software Enginee...PATHS at the Language Technology Group, Computer Science and Software Enginee...
PATHS at the Language Technology Group, Computer Science and Software Enginee...
 
Semantic Enrichment of Cultural Heritage content in PATHS
Semantic Enrichment of Cultural Heritage content in PATHSSemantic Enrichment of Cultural Heritage content in PATHS
Semantic Enrichment of Cultural Heritage content in PATHS
 
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 User-Centred Design to Support Exploration and Path Creation in Cultural Her... User-Centred Design to Support Exploration and Path Creation in Cultural Her...
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 
PATHS Final state of art monitoring report v0_4
PATHS  Final state of art monitoring report v0_4PATHS  Final state of art monitoring report v0_4
PATHS Final state of art monitoring report v0_4
 
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...
Supporting User's Exploration of Digital Libraries, Suedl 2012 workshop proce...
 
PATHS Content processing 2nd prototype-revised.v2
PATHS Content processing 2nd prototype-revised.v2PATHS Content processing 2nd prototype-revised.v2
PATHS Content processing 2nd prototype-revised.v2
 

Similar to De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17

My E-mail appears as spam - troubleshooting - domain name and E-mail content ...
My E-mail appears as spam - troubleshooting - domain name and E-mail content ...My E-mail appears as spam - troubleshooting - domain name and E-mail content ...
My E-mail appears as spam - troubleshooting - domain name and E-mail content ...Eyal Doron
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...Gangcai Lin
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedYes Lifecycle Marketing
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email deliver-ability by SCI
Email deliver-ability by SCIEmail deliver-ability by SCI
Email deliver-ability by SCINancy Seeger
 
Emails Part 1 - Megan's Copy.pdf
Emails Part 1 - Megan's Copy.pdfEmails Part 1 - Megan's Copy.pdf
Emails Part 1 - Megan's Copy.pdfBloomerang
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology featuresShweta Jain
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
about-our-spamtrap-collection
about-our-spamtrap-collectionabout-our-spamtrap-collection
about-our-spamtrap-collectionAtro Tossavainen
 

Similar to De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 (20)

My E-mail appears as spam - troubleshooting - domain name and E-mail content ...
My E-mail appears as spam - troubleshooting - domain name and E-mail content ...My E-mail appears as spam - troubleshooting - domain name and E-mail content ...
My E-mail appears as spam - troubleshooting - domain name and E-mail content ...
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths Debunked
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email deliver-ability by SCI
Email deliver-ability by SCIEmail deliver-ability by SCI
Email deliver-ability by SCI
 
Emails Part 1 - Megan's Copy.pdf
Emails Part 1 - Megan's Copy.pdfEmails Part 1 - Megan's Copy.pdf
Emails Part 1 - Megan's Copy.pdf
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology features
 
Exchange Online Protection
Exchange Online ProtectionExchange Online Protection
Exchange Online Protection
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
about-our-spamtrap-collection
about-our-spamtrap-collectionabout-our-spamtrap-collection
about-our-spamtrap-collection
 

More from Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...Eyal Doron
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
 

More from Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17

  • 1. Page 1 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com DE-LIST YOUR ORGANIZATION FROM A BLACKLIST | MY E-MAIL APPEARS AS SPAM | PART 16#17 In the following article, we review the charters of a scenario in which your organization appears as blacklisted. For the avoidance of doubt – the purpose of this article is not to provide a detailed instruction and links to the procedure of de-listing your organization from a specific blacklist. The purpose of the current article is – to provide the flow and the structure of the tasks that we need to be implemented and best practices for a scenario of internal outbound spam.
  • 2. Page 2 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com The great drama: My organization appears as “blacklisted”! Let’s start with a dramatic sentence: my organization appears as “blacklisted”! Q1: What is the meaning of: “my organization” appears as blacklisted”? Q2: What should I do in a scenario of: “my organization” appears as blacklisted”? Q3: Is there a specific charter of the scenario: “my organization appears as blacklisted” in Office 365 and Exchange Online environment? The meaning of – “my organization” appears as blacklisted The term: ”my organization”, could be translated into one of the four following options: 1. Public domain name A scenario, in which your organization, public domain name appears as blacklisted. 2. Mail server IP address
  • 3. Page 3 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com A scenario, in which your mail server IP address appears as: blacklisted. As mentioned before – In an Office 365 and Exchange Online environment, the scenario in which your “formal Exchange Online IP address” appears as blacklisted is very rare. The most common scenario is a scenario in which that the IP address that appear as “blacklisted”, belong to the “special Exchange Online servers” that are classified as: “Higher Risk Delivery Pool”. 3. Specific E-mail message content A scenario in which a specific E-mail message will be blocked because the content of the E-mail message. In this case, it’s not clear if the “spam filter” decides to block also the recipient who sent out the E-mail, the specific mail server that sent out the E-mail or, the complete domain name that is a part of the recipient E-mail address. 4. E-mail address of a specific recipient organization The scenario in which the “issue” relates to a specific organization E-mail address is less common. In this scenario, a specific organization’s recipient is blacklisted.
  • 4. Page 4 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com The optional scenario for “blacklisted” and their level of severity. A scenario in which mail that was sent by one of our organization users identified as spam mail and for this reason, blocked by the destination mail server or, sent to the junk mail folder as the destination external recipient, is not a desirable scenario. The main question in this scenario is not if this scenario is desirable or not, but instead – what is the “factor”, that the destination mail infrastructure use for identifying the E-mail that was sent by one of our origination users as a spamJunk mail.
  • 5. Page 5 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Option 1: the organization domain name is blacklisted. The “less preferred scenario” is – the scenario in which our domain name appears as Blacklisted. This type of scenario described as: “less preferred” because, in this case, the “guilt” is upon the organization domain name. In this scenario, all of the organization users are affected and not only to a specific organization user. The problem in which the mail that is sent from our origination is identified as spamJunk mail is not related only to a specific “event” or a specific mail item that includes specific content but instead, to all the “outbound mail flow” of our organization users. In the following diagram, we can see an example of this concept.
  • 6. Page 6 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com The cause of the problem is the Office 365 recipient domain name (the “right part” of the E-mail address). The destination mail server “refuse” to accept the E-mail message not because there is a problem with the E-mail message content but because – the E-mail message sent from a domain name that appears as blacklisted. In this type of scenario in which our organization domain name appears on a blacklisted, we will need to contact the “blacklist provider” and ask him to be removed (remove our domain name) from the blacklist. Option 2: mail server IP address is blacklisted. The severity of this scenario depends on the specific mail infrastructure that we use.
  • 7. Page 7 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Non-Office 365 and Exchange Online mail infrastructure In case that your mail infrastructure is not based on the Office 365 and Exchange Online mail infrastructure, a scenario in which your mail server appears as blacklisted, consider also as critical scenario. The level of the “criticality” depends on the structure of your mail infrastructure. In case that your organization has only one mail server, the “critical level” is very high because, all the organization mail is
  • 8. Page 8 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com sent via a specific mail server and in case that this mail server is blacklisted, this is a major problem. In case that the organization mail infrastructure is based on more than one mail server, the “critical level” is less severe because – there is an option to route all the rest of the organizational E-mail messages via the additional organization mail servers, until the problem with the specific mail server will be resolved. Office 365 and Exchange Online mail infrastructure In Office 365 and Exchange Online the organization is represented by the Exchange Online server and in a very specific scenario, in case that the E-mail message that was sent by the Office 365 users identified as spamJunk mail by the EOP (Exchange Online protection) the specific E-mail message will be routed via the Exchange Online High Risk Delivery Pool. The scenario in which the “formal Exchange Online” IP address that represent the organization will appear is blacklisted is very rare. The more likely scenario, is that in case that the E-mail message was sent via the Exchange Online High Risk Delivery Pool, the destination mail server will reject the E-mail message and notify us that “our mail server” is blacklisted. In this scenario, the “guilt” is alleged upon the Exchange Online Higher Risk Delivery Pool.
  • 9. Page 9 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Office 365 spam filters, recognize that the office365 users try to send out an E-mail message that consider as “problematic”. To avoid from a scenario in which all the organizations will be “stamped” as “problematic”, the specific E-mail message is routed via the mail server that was created for this type of E- mail messages – the Exchange Online Higher Risk Delivery Pool. The basic assumption is that some of the IP address that are used by the Exchange Online- High Risk Delivery Pool, is already listed in some blacklists. Conclusion
  • 10. Page 10 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com In Office 365 and Exchange Online environment the scenario which we describe as: “my mail server appears as blacklisted”, does not lead to the conclusion that the problem is related to the “Office 365 mail server”. Instead, the problem is related to the “element” to a specific Office 365 user and to a specific E-mail message content, which was sent by the Office 365 users, identified as spam by the EOP and routed via the Exchange Online- High Risk Delivery Pool. The cause of the problem is a specific E-mail content to “lead” into a scenario in which the E-mail message sent via the Exchange Online Higher Risk Delivery Pool. The “other side” classifies the E-mail message as spamJunk mail, but this “classification” relates only to the specific session and only to the specific E-mail message. In case that the Office 365 recipients will send a new E-mail message that doesn’t contain a problematic content, most of the chances that the E-mail message will successfully be sent to the destination external recipient. Option 3: a specific E-mail address (organization user) is blacklisted. This scenario could be realized, however, this scenario is less common. In some cases, the spam filter is listing a very specific E-mail address and not relate to the “whole domain part”.
  • 11. Page 11 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com What do I need to do for getting “de-listed” from a blacklist? Technically speaking, there are two ways in which your organization will be removed from a specific blacklist: 1. Self-service removal A a process in which an organization representative should fill a request form, in which he asks to be de-listed from the blacklist and, lists the reason or explanations for his request. In simple words: the organization representative, should explain why his organization was recognized as an “element” the distribute spam mail by mistake. 2. Time-Based Removal Some of the blacklist provider implements an automatic mechanism in which the domain name or the IP address of the domain that was registered at the blacklist, will be removed automatically after a specific time period. In simple words: if the origination will not make any more additional problem and, act as a “good boy” the reward is that – his detailed will be removed from the blacklist. The problem is that we as an organization, have no control over the process.
  • 12. Page 12 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com “De-list” checklist, from a blacklist Yes, I know that this heading sounds a bit funny. Verify that you understand the following parts and can answer the following questions: The problem scope Q: Did your organization is blacklisted by a specific blacklist or, by a couple of blacklist providers? A: The first and most important steps is to verify, what the scope of the problem: does your organization appear as blacklisted in a very specific blacklist or a couple of blacklists. You can get a quick answer to this question by using online services that will help you to check multiple blacklist providers from one place. You can read more detailed information in the article: My E- mail appears as spam | Troubleshooting – Mail server | Part 15#17 Your organization mail infrastructure details Q: When we say: “our organization is blacklisted” are you fully understand the meaning? Q: Does your domain name is blacklisted?
  • 13. Page 13 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Q: Does your mail server is blacklisted? Q: If you have more, then one mail server, do you have a list of all the existing mail servers who represent your organization? Q: When you check for information about a scenario in which your mail server is blacklisted, and you have more than one mail server, did you check if the additional mail servers IP address appears as blacklisted? A: Before you start the “de-list procedure” verify that you have all the required information in front of you. The reasons that lead us to the scenario. Q: Can you speculate regarding the reasons that lead us to the scenario in which your organization appears as blacklisted? Q: Do you think that the “root cause” of the problem is related to: bulk mail, to a specific E-mail message content? To a specific user? A: There is no point investing all efforts and energy in the “de- list” process and hoping to get “de-listed if the “element” that causes for this problem continue the specific behavior.
  • 14. Page 14 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Implement your due diligence You find out that your organization appears as blacklisted in a specific blacklist. You feel the appearance of the bitterness emotional and the question that appears: why did you do such a thing? Before we are pointing our finger to the “element that blacked listed” our organization and causes us grief, let’s take a moment and verify if this is a classic scenario of false-positive meaning: our legitimate E-mail was recognized as spamjunk mail by a mistake or….Maybe there is a reason that leads to the unwanted scenario, in which our organization appears as blacklisted. The reason for implementing this: “due diligence” is – that in a scenario which we indeed have a problem because we use a commercial mail that violates a common standard, we will
  • 15. Page 15 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com continue to have problems not only with a specific blacklist provider but with many others. Is “easy” to get on a blacklist, but the process of “getting out” from a blacklist is not easy. An additional issue is our “integrity”. Before we are sending the request to be “removed from the blacklist” and we commit that – the process in which our mail infrastructure was classified as “problematic” is a mistake (false positive), I think that is fair to implement a little investigation and try to verify if our organization “do something” that lead us to a scenario in which “others” identified E-mail message that is sent from our organization as spamjunk mail.
  • 16. Page 16 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Ask to be removed (de-list) from a blacklist In a scenario in which our organization mail infrastructure appears as blacklisted in a “well know blacklist providers”, it’s obvious that the only thing that we want is – to immediately be excluded from the blacklist because, the outcome is a serious disruption of our business activity. In a perfect world, we will have to say specific magic words and… the problem will despair in two (or maybe 4) seconds. In the real world, the process is not so easy!
  • 17. Page 17 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Blacklist providers as Black box I relate to the subject of – blacklist providers as a “Black box” because, the “vague nature” of the blacklist providers. The main excuse for this “ambiguity”, is maybe the “security argument” which is used to explain why there is no option for providing a detailed information about the reason that a specific domain name or specific IP address of the mail server was added to a blacklist. My opinion is that the “security argument” is not strong enough to answer additional questions and requirement such as – the ability to get a formal response from the blacklist providers. For example – approval that he got our request, update
  • 18. Page 18 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com notification that will inform us if the de-list request was complete successfully or not, etc. I know that this could be considered as a “generalization” and I am sure that there are significant differences between the different “blacklist providers” but, from my experience, the contrast between the business need to – urgently solve a problem in which the organization domain name appears in a blacklist verses the difficulty to get a response from “blacklist providers” could be very frustrating. 4 reasons for relating to “blacklist providers” as a Black box In a scenario in which your organization appears a blacklisted, there are a couple of “parts” that are responsible for the “uncertainty” of the process.
  • 19. Page 19 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com 1. The reason for adding your domain name mail server IP address The Inability to get information about the specific reasons that leads to the outcome in which our organization is blacklisted. The reason for ambiguity is that each of the “blacklist providers”, keeps in secret the algorithm and the methods, that he uses for identifying a specific E-mail item or specific organization as “entity” that sends spamjunk mail. 2. The formal way to implement a “de-list process” Some of the “blacklist providers”, provide a very clear guide about how to implement the process of “asking to be removed from a blacklist” and some are not. I have also seen scenarios in which the specific “blacklist providers” request money for implementing the process of the “de-list”. 3. A contact person Most of the “blacklist providers” will not provide a phone number, an E-mail address of a contact person. The logic that is implemented by most of the “blacklist providers” is:  Fill in the request form, in which you ask to remove your organization name from the blacklist.  We will read your request.  Perform different checks
  • 20. Page 20 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com  If we decide that you are “entitled” to be removed from the blacklist, we will remove the information about your organization from the blacklist. 4. Formal response The section is based on the concept of “section 3”. Most of the “blacklist providers”, will not send an “update or a notification E-mail” in case that they decide to remove your organization from the blacklist. The responsibility for checking and verifying that your request to be de-list was “approved”, is your responsibility! You will need to access the “blacklist provider” website and re- check the information about your status. Conclusions 1. Implement all the best practices and the preventive actions that you help your to avoid a future scenarios, in which your organization appears as blacklisted. 2. Try to get all the available information about the process or the procedure of de- listing your organization from the specific blacklist provider.
  • 21. Page 21 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com 3. Take a deep breath, carry your eyes to the sky and hope for the best! 4. After you complete the de-list process, access the website of the “blacklist provider” and verify if your organization still appears as blacklisted. 5. Let’s assume that there was a reason for adding your organization to a blacklist and let’s assume that the “blacklist provider” was kind enough to remove your origination from the blacklist. Verify that you “fix” all the issues that lead to the problem in the first time. Don’t make the same mistake again because if the “next time” occurs, the blacklist providers will be less forgiving.
  • 22. Page 22 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Additional reading  Request that a user, domain, or IP address be removed from a block list after sending outbound spam  Getting delisted by Microsoft delist@messaging.microsoft.com  How to Check Microsoft’s Blacklist  Request a delisting from a blacklist  blocked using Blocklist 1; To request removal from this list please forward this message to delist@messaging.microsoft.com  Help and support for EOP Internal outbound spam in Office 365 environment | Article series index A quick reference for the article series My E-mail appears as a spam | Article series index | Part 0#17 The article index of the complete article series
  • 23. Page 23 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Introduction to the concept of internal outbound spam in general and in Office 365 and Exchange Online environment My E-mail appears as a spam – Introduction | Office 365 | Part 1#17 The psychological profile of the phenomenon: “My E-mail appears as a spam!”, possible factors for causing our E-mail to appear a “spam mail”, the definition of internal outbound spam. Internal spam in Office 365 – Introduction | Part 2#17 Review in general the term: “internal outbound spam”, miss conceptions that relate to this term, the risks that are involved in this scenario, outbound spam E-mail policy and more. Internal spam in Office 365 – Introduction | Part 3#17 What are the possible reasons that could cause to our mail to appear as spamjunk mail, who or what are this “elements”, that can decide that our mail is a spam mail?, what are the possible “reactions” of the destination mail infrastructure that identify our E- mail as spamjunk mail?.
  • 24. Page 24 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Commercial E-mail – Using the right tools | Office 365 | Part 4#17 What is commercial E-mail? Commercial E-mail as part of the business process. Why do I think that Office 365 Exchange Online is unsuitable for the purpose of commercial E-mail? Introduction if the major causes for a scenario in which your organization E-mail appears as spam My E-mail appears as spam | The 7 major reasons | Part 5#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail: 1. E-mail content, 2. Violation of the SMTP standards, 3. BulkMass mail My E-mail appears as spam | The 7 major reasons | Part 6#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail: 4. False positive, 5. User Desktop malware, 6. “Problematic” Website
  • 25. Page 25 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com Introduction if the subject of SPF record in general and in Office 365 environment What is SPF record good for? | Part 7#17 The purpose of the SPF record and the relation to for our mail infrastructure. How does the SPF record enable us to prevent a scenario in which hostile elements could send E-mail on our behalf. Implementing SPF record | Part 8#17 The “technical side” of the SPF record: the structure of SPF record, the way that we create SPF record, what is the required syntax for the SPF record in an Office 365 environment + mix mail environment, how to verify the existence of SPF record and so on. Introduction if the subject of Exchange Online - High Risk Delivery Pool High Risk Delivery Pool and Exchange Online | Part 9#17 How Office 365 (Exchange Online) is handling a scenario of internal outbound spam by using the help of the Exchange Online- High Risk Delivery Pool.
  • 26. Page 26 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com High Risk Delivery Pool and Exchange Online | Part 10#17 The second article about the subject of Exchange Online- High Risk Delivery Pool. The troubleshooting path of internal outbound spam scenario My E-mail appears as spam – Troubleshooting path | Part 11#17 Troubleshooting scenario of internal outbound spam in Office 365 and Exchange Online environment. Verifying if our domain name is blacklisted, verifying if the problem is related to E-mail content, verifying if the problem is related to specific organization user E-mail address, moving the troubleshooting process to the “other side. My E-mail appears as spam | Troubleshooting – Domain name and E-mail content | Part 12#17 Verify if our domain name appears as blacklisted, verify if the problem relates to a specific E-mail message content, registering blacklist monitoring services, activating the
  • 27. Page 27 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com option of Exchange Online outbound spam. My E-mail appears as spam | Troubleshooting – Mail server | Part 13#17 What is the meaning of: “our mail server”?, Mail server IP, host name and Exchange Online. One of our users got an NDR which informs him, that his mail server is blacklisted!, How do we know that my mail server is blacklisted? My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17 The troubleshooting path logic. Get the information from the E-mail message that was identified as spamNDR. Forwarding a copy of the NDR message or the message that saved to the junk mail My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17 Step B – Get information about your Exchange Online infrastructure, Step C – fetch the information about the Exchange Online IP address, Step D – verify if the “formal “Exchange Online IP address a
  • 28. Page 28 of 28 | De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Written by Eyal Doron | o365info.com De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Review the charters of a scenario in which your organization appears as blacklisted. The steps and the operations that need to be implemented for de-list your organization from a blacklist. Summery and recap of the troubleshooting and best practices in a scenario of internal outbound spam Dealing and avoiding internal spam | Best practices | Part 17#17 Provide a short checklist for all the steps and the operation that relates to a scenario of – internal outbound spam.