SlideShare a Scribd company logo
Page 1 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
MY E-MAIL APPEARS AS SPAM | THE 7
MA JOR REASONS | PART 5#17
In the following article and the next article (My E-mail appears as
spam | The 7 major reasons | Part 6#17), we will review six major
reasons that could lead to a scenario in which E-mail that is sent
from our organization, identified as spam E-mail.
In the current article we will review the following causes:
 E-mail content
 Violation of the SMTP standards
 BulkMass mail
In our journey to become internal  outbound spam professionals
(unfortunately, at the current time, there is currently no such
university degree), we will need to:
Page 2 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
1. Know about the major causes for internal  outbound spam scenario.
2. Know what troubleshooting tools to use for detects the specific cause.
3. Know what steps need to be implemented for avoiding such causes.
Note – the last major reason for: “My E-mail appears as spam”
is related to the SPF record infrastructure. We will review the
subject of the SPF record in two dedicated articles:
 What is SPF record good for? | Part 7#17
 Implementing SPF record | Part 8#17
1. E-mail content
Page 3 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
A commercial E-mail (Marketing E-mail, mailing list, newsletters, etc.)
that is written improperly, could easily lead to a scenario in which
mail that is sent from your organization, will be recognized and
classified as spamjunk mail. The mail specific content, is one of the
major causes of the internal  outbound spam problem.
The three major factors, which are responsible for a “problematic
mail content” are:
 Specific words, phrases and writing style
 HTML coding
 Commercial E-mail “rules”
1. Mail content | specific words, phrases
and writing style
Avoid from writing a content that could be recognized as spam.
Page 4 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
It’s highly recommended, to learn through about the subject of: how
to write commercial E-mail in the “right way”.
The article: How to Avoid Spam Filters include good examples of E-
mail content, which could be classified as spam or a “spammy
criterion”.
For example E-mail that include one or more of the following
charters:
 Using phrases like “Click here!” or “Once in a lifetime opportunity!”
 Excessive use of exclamation points!!!!!!!!!
 USING ALL CAPS, WHICH IS LIKE SCREAMING AT THE TOP OF YOUR
LUNGS VIA EMAIL (especially in the subject line).
 Using bright red or green colored fonts.”
2. Bad HTML coding
Using a “Bad HTML coding” in your commercial E-mail, could lead to a
scenario, which attract attention of spam filters.
An examples for “Bad HTML coding” appear in the excellent article:
Most Common Spam Filter Triggers
1. BODY: HTML has a low ratio of text to image area (1,217 matches)
2. BODY: Message only has text/html MIME parts (971)
3. BODY: HTML has a low ratio of text to image area (729)
4. BODY: HTML and text parts are different (625)
5. Subject is all capitals (324)
6. BODY: HTML and text parts are different (279)
7. BODY: HTML: images with 2400-2800 bytes of words (211)
Page 5 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
3. Violation of 
“Marketing mail rules”|
Use the concept of: “permission-based
emails”
When an organization uses the option of: “marketing mail”, we can
define two major groups:
1. Spam mail or an unsolicited E-mail
2. Legitimate marketing mail described as – permission-based email
marketing (also known as opt-in email). The meaning of: permission-
based email marketing “ is – sending commercial E-mail to people who
have asked to receive them.
When sending a commercial E-mail to a distribution list, the basic
assumption is that this “customer” asks or wants this E-mail
message.
In case that they want to stop getting our E-mails, they will need to
have a way of asking us to stop sending then our E-mail.
One of the most elements that can cause to external organization to
classify your commercial E-mail is -the lack of the “un-subscribe
option” that enable your customers to inform you that they are not
interested in your marketing E-mails.
Additional reading
 Permission-based Email Marketing
 Permission Based Marketing Policy
 Permission Marketing
 Opt-in email
 opt-in e-mail
 What is an Opt-In List?
 Email Opt-In: Single Opt-In Versus Double Opt-In
Page 6 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Your E-mail spam score
When your E-mail is reaching to the destination mail infrastructure,
most of the “destination mail systems” will scan and verify the
“integrity” of the E-mail item. For example: a spam filter that will scan
your E-mail items and “stamp” your E-mail with a “spam score”.
The “spam score” is created after the specific mail infrastructure
checks your E-mail message by using different parameters.
Each of the different parameters gets a specific score. In case that
your E-mail item exceeds a certain threshold, your email will be
classified as spamjunk mail and the outcome could be a scenario in
which your E-mail will be deleted by the destination mail server or,
your E-mail will be stamped as “spam mail”, which will lead to the
scenario of: E-mail message goes to the junk folder.
Page 7 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Additional reading
 How to Avoid Spam Filters
 Most Common Spam Filter Triggers
How to Write E-mail Content to Avoid the Dreaded Spam Filter
 Is Your Email Marketing CAN-SPAM Compliant? 7 Common
Mistakes People Make
 A Marketer’s Guide to Getting Past Email Spam Filters
 What To Do to Avoid Being Flagged as Spam?
 Email Tips to Avoid Spam Filters and 9 Top Email Marketing Tools
 Avoiding the Spam Folder: Email Marketing Best Practices
 10 Tips to Keep Email Out of the Spam Folder
Best practice and recommendation for commercial E-mail
Test your “Marketing E-mail” spam score
In case that you have prepared a commercial E-mail, and you are
going to send this mail to your customer, wait!
Before you hit the “send mail” key, which will send your E-mail to
tens, hundreds or even thousands of recipients, it is highly
recommended that you implement some kind of “spam testing
procedure” that will enable you to get information about the “spam
score” of your specific E-mail message.
Page 8 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
There are several “free online services” that will enable you to
examine the marketing E-mail that you are going to send to your
customer.
In the following section, we will demonstrate a nice and interesting
tool: Test the Spammyness of your Emails (https://www.mail-
tester.com)
This web based tool, can help us to get the value of the spam score
and additionally, in case that the “spam test” discovers possible
issues, the information is displayed in easy to understand way.
In the following screenshot, we can see that “spam test” result that
we got by testing a specific E-mail item.
Page 9 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
In our scenario, we can see that the score that we got (8 from 10) is
because there are some issues. The “main issue” in our scenario, is
that the organization domain name appears in one blacklist.
When clicking on the “red scare”, we can get a detailed view that
shows us, the list of the blacklist providers was checked + the backlist
provider that registered our domain as blacklisted.
Page 10 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Additional reading
 Test the Spammyness of your Emails
 Email Spam Checker
 Email Spam Test
 postmarkapp
 Lyris ContentChecker for Email
 isnotspam
2. Violation of the SMTP standards
One if the prominent signs for spam E-mail, is an E-mail message
that “violate” SMTP standards.
Spammers use this “violation of the SMTP standards” for covering
their tracks or deceive the destination recipient. For example: by
Page 11 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
“declaring” that the E-mail was sent from X while, in reality, the E-mail
message was sent from Y.
The problem is that sometime, even a legitimate organization that
sends a “legitimate commercial E-mail”, could be sent out E-mails
that could look to the destination side, as a “suspicious E-mail” or E-
mail that violates SMTP standards.
A possible example of signs, which can lead to a scenario in which an
E-mail message will be identified a spamJunk mail could be:
1. From: and Reply To: address is different:
In a “standard” E-mail message, the “From” filed and the: “Reply To”
filed include the same recipient name (E-mail address).
The scenario in which the From: and “Reply To”: address is different,
could be a sign of spamJunk mail, but at the same time, this is also
very common with the newsletter’s E-mails.
The Message subject contains an E-mail address.
Spammers use this method to mislead the destination recipient and
make him think that the E-mail message is legitimate.
2. Empty To: field:
Spammers use this method because they send bulk E-mail to
hundreds or even thousands of recipients and, they want to hide this
information from the destination recipient.
For this reason, they add the list of the destination recipient to the
BCC field.
Additional reading
 How to effectively stop spam and junk mail
 Top 10 spam characteristics (#1-5)
Page 12 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
 The top 10 spam characteristics (#6-10)
 FC822: Standard for ARPA Internet Text Messages
3. BulkMass mail
One of the most common risks when sending a commercial E-mail to
a large number of recipients is – that external mail system will
recognize your mail server as a “bulk mailer’s server” and, for this
reason, E-mails that will be sent from your mail server are we
classified as spamJunk mail.
Q: Does Exchange Online “identify” outbound bulk mail scenarios?
A: The answer is: “Yes”, an Exchange use spam filter that uses a
rating system named: Bulk Complaint Level (BCL) rating.
As far as I know, the method of Bulk Complaint Level (BCL) rating is
used only by “Exchange based mail servers”.
Regarding outbound spam mail, in case that the Exchange Online
recognizes a scenario which can be considered as “bulk mail”, the E-
mail message will be routed to the Exchange Online- High Risk
Delivery Pool and in more critical cases, the Office 365 recipients will
be blocked and will not be able to continue to send Outlook E-mail
messages.
Attached a quote from the Microsoft MSDN blog:
Disabling of offending accounts when they send too much email
marked as spam
Page 13 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Even though we segregate our spam and non-spam into two
separate outbound IP pools, the email accounts cannot send spam
indefinitely. We monitor which accounts are sending spam and if it
exceeds a limit, the account is blocked from sending spam.
[Source of information: Understanding outbound spam controls in Office
365 ]
Additional reading
 Bulk Complaint Level values
 Take Advantage of EOPs new Bulk Mail Detection
 Different Levels of Bulk Mail filtering in Office 365
 What’s the difference between junk email and bulk email?
 Use transport rules to configure bulk email filtering
 Block spam this holiday season with the new enhanced bulk mail
experience in EOP
Q: Can I use Exchange Online as a solution for bulk E-mail?
A: The simple answer is: No!
Let’s start from the end: Office 365 and Exchange Online is not the
“right” infrastructure for implementing a business need of bulk mail.
Technically speaking, the Exchange Online infrastructure “allow” a
maximum of 10,000 mail items per users but, there is an additional
limitation such as the maximum number of mail items per hour and
more.
The “declaration” that Exchange Online is not considered as suitable
solution for bulk E-mail, appear in the public Microsoft article:
Exchange Online Limits
Page 14 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Exchange Online customers who need to send legitimate bulk
commercial email (for example, customer newsletters) should use
third-party providers who specialize in these services.
Another source of information that relates to subjects of bulk E-mail,
appear in the article: Understanding outbound spam controls in
Office 365
b) Use a 3rd party bulk emailer to send the mass communication
There are several 3rd party bulk emailers whose sole business it is to
send bulk email. They can work with customers to ensure that they
have been well emailing practices, and they have resources
dedicated to enforcing it.
The Messaging, Mobile, Malware Anti-Abuse Working Group
(MAAWG) publishes its membership roster here:
http://www.maawg.org/about/roster
Several bulk email providers are on the list and are known to be
responsible Internet citizens.
Note – you can read additional information about this subject in
the article:
Commercial E-mail – Using the right tools | Office 365 | Part 4#17
Q: What could be considered as a suitable solution for bulk E-mail?
A: The simple answer is: using a third party provider, that specialized
in providing a solution of bulk E-mail.
Q: Can you recommend or provide me a name of such bulk mail
providers?
Page 15 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
A: You will have to look for yourself for this kind of services. If it
helps, there are websites such as: “Anti-Abuse Working Group
(MAAWG) (https://www.m3aawg.org/about/roster),
which provide a list or “recommended” or well know bulk mail
Page 16 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
providers
Page 17 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Additional reading
 Exchange Online Limits
 Bulk email software
Internal  outbound spam in Office 365
environment | Article series index
A quick reference for the article series
My E-mail appears as a spam | Article
series index | Part 0#17
The article index of the complete
article series
Introduction to the concept of internal  outbound spam in general
and in Office 365 and Exchange Online environment
My E-mail appears as a spam –
Introduction | Office 365 | Part 1#17
The psychological profile of the
phenomenon: “My E-mail appears as
a spam!”, possible factors for causing
our E-mail to appear a “spam mail”,
the definition of internal  outbound
spam.
Page 18 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Internal spam in Office 365 –
Introduction | Part 2#17
Review in general the term: “internal 
outbound spam”, miss conceptions
that relate to this term, the risks that
are involved in this scenario,
outbound spam E-mail policy and
more.
Internal spam in Office 365 –
Introduction | Part 3#17
What are the possible reasons that
could cause to our mail to appear as
spamjunk mail, who or what are this
“elements”, that can decide that our
mail is a spam mail?, what are the
possible “reactions” of the destination
mail infrastructure that identify our E-
mail as spamjunk mail?.
Commercial E-mail – Using the right
tools | Office 365 | Part 4#17
What is commercial E-mail?
Commercial E-mail as part of the
business process. Why do I think that
Office 365 Exchange Online is
unsuitable for the purpose of
commercial E-mail?
Introduction if the major causes for a scenario in which your
organization E-mail appears as spam
Page 19 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
My E-mail appears as spam | The 7
major reasons | Part 5#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
1. E-mail content, 2. Violation of the
SMTP standards, 3. BulkMass mail
My E-mail appears as spam | The 7
major reasons | Part 6#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
4. False positive, 5. User Desktop
malware, 6. “Problematic” Website
Introduction if the subject of SPF record in general and in Office
365 environment
What is SPF record good for? | Part
7#17
The purpose of the SPF record and the
relation to for our mail infrastructure.
How does the SPF record enable us to
prevent a scenario in which hostile
elements could send E-mail on our
behalf.
Page 20 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Implementing SPF record | Part 8#17
The “technical side” of the SPF record:
the structure of SPF record, the way
that we create SPF record, what is the
required syntax for the SPF record in
an Office 365 environment + mix mail
environment, how to verify the
existence of SPF record and so on.
Introduction if the subject of Exchange Online - High Risk Delivery
Pool
High Risk Delivery Pool and Exchange
Online | Part 9#17
How Office 365 (Exchange Online) is
handling a scenario of internal 
outbound spam by using the help of
the Exchange Online- High Risk
Delivery Pool.
High Risk Delivery Pool and Exchange
Online | Part 10#17
The second article about the subject
of Exchange Online- High Risk
Delivery Pool.
The troubleshooting path of internal  outbound spam scenario
Page 21 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
My E-mail appears as spam –
Troubleshooting path | Part 11#17
Troubleshooting scenario of internal 
outbound spam in Office 365 and
Exchange Online environment.
Verifying if our domain name is
blacklisted, verifying if the problem is
related to E-mail content, verifying if
the problem is related to specific
organization user E-mail address,
moving the troubleshooting process
to the “other side.
My E-mail appears as spam |
Troubleshooting – Domain name and
E-mail content | Part 12#17 Verify if
our domain name appears as
blacklisted, verify if the problem
relates to a specific E-mail message
content, registering blacklist
monitoring services, activating the
option of Exchange Online outbound
spam.
My E-mail appears as spam |
Troubleshooting – Mail server | Part
13#17
What is the meaning of: “our mail
server”?, Mail server IP, host name
and Exchange Online. One of our
users got an NDR which informs him,
that his mail server is blacklisted!,
How do we know that my mail server
is blacklisted?
Page 22 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
My E-mail appears as spam |
Troubleshooting – Mail server | Part
14#17
The troubleshooting path logic. Get
the information from the E-mail
message that was identified as
spamNDR. Forwarding a copy of the
NDR message or the message that
saved to the junk mail
My E-mail appears as spam |
Troubleshooting – Mail server | Part
15#17
Step B – Get information about your
Exchange Online infrastructure, Step
C – fetch the information about the
Exchange Online IP address, Step D –
verify if the “formal “Exchange Online
IP address a
De-list your organization from a
blacklist | My E-mail appears as spam
| Part 16#17
Review the charters of a scenario in
which your organization appears as
blacklisted. The steps and the
operations that need to be
implemented for de-list your
organization from a blacklist.
Summery and recap of the troubleshooting and best practices in a
scenario of internal  outbound spam
Page 23 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17
Written by Eyal Doron | o365info.com
Dealing and avoiding internal spam |
Best practices | Part 17#17
Provide a short checklist for all the
steps and the operation that relates
to a scenario of – internal  outbound
spam.

More Related Content

What's hot

B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
B2B Email Experts
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Pinpointe On-Demand
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt showInformz
 
Email Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POVEmail Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POV
Josue Sierra
 
Introduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachIntroduction to the Epsilon Data Breach
Introduction to the Epsilon Data Breach
The Lorenzi Group
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
Learnhomebusiness.com
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetmaria martha manette madrid
 
Email deliver-ability by SCI
Email deliver-ability by SCIEmail deliver-ability by SCI
Email deliver-ability by SCI
Nancy Seeger
 
Phishing
PhishingPhishing
Phishing
Programmer
 
Double optinandemailmarketing en
Double optinandemailmarketing enDouble optinandemailmarketing en
Double optinandemailmarketing en
Talkfusion Vídeo e Comunicação
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social NetworkingHeather Grimes
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
US Privacy Associates
 
Vip email database
Vip email databaseVip email database
Vip email database
Shajahan Ali
 
Gdpr compliance critical changes
Gdpr compliance critical changesGdpr compliance critical changes
Gdpr compliance critical changes
Angela Nubbert
 

What's hot (18)

B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt show
 
Email Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POVEmail Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POV
 
Introduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachIntroduction to the Epsilon Data Breach
Introduction to the Epsilon Data Breach
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internet
 
Email deliver-ability by SCI
Email deliver-ability by SCIEmail deliver-ability by SCI
Email deliver-ability by SCI
 
Phishing
PhishingPhishing
Phishing
 
Double optinandemailmarketing en
Double optinandemailmarketing enDouble optinandemailmarketing en
Double optinandemailmarketing en
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
E spam
E spamE spam
E spam
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Vip email database
Vip email databaseVip email database
Vip email database
 
Gdpr compliance critical changes
Gdpr compliance critical changesGdpr compliance critical changes
Gdpr compliance critical changes
 

Viewers also liked

How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
Eyal Doron
 
Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...
pathsproject
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsadesignforchangechallenge
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Eyal Doron
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
designforchangechallenge
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
Eyal Doron
 
Past Perfect Tense Nurlaela 201212500067
Past Perfect Tense Nurlaela 201212500067Past Perfect Tense Nurlaela 201212500067
Past Perfect Tense Nurlaela 201212500067
nurlaelanur
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
bibliotecasjuliomartins
 
Ozon
OzonOzon
OzonAyu P
 
Fichas de la y
Fichas de la yFichas de la y
Presentatie bibnet
Presentatie bibnetPresentatie bibnet
Presentatie bibnetBramStarckx
 
Exchange infrastructure implementing single domain namespace scheme part 2#...
Exchange infrastructure  implementing single domain namespace scheme  part 2#...Exchange infrastructure  implementing single domain namespace scheme  part 2#...
Exchange infrastructure implementing single domain namespace scheme part 2#...
Eyal Doron
 
Exchange clients and their public facing exchange server part 13#36
Exchange clients and their public facing exchange server  part 13#36Exchange clients and their public facing exchange server  part 13#36
Exchange clients and their public facing exchange server part 13#36
Eyal Doron
 

Viewers also liked (13)

How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...Evaluating the Use of Clustering for Automatically Organising Digital Library...
Evaluating the Use of Clustering for Automatically Organising Digital Library...
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsa
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
 
Past Perfect Tense Nurlaela 201212500067
Past Perfect Tense Nurlaela 201212500067Past Perfect Tense Nurlaela 201212500067
Past Perfect Tense Nurlaela 201212500067
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
 
Ozon
OzonOzon
Ozon
 
Fichas de la y
Fichas de la yFichas de la y
Fichas de la y
 
Presentatie bibnet
Presentatie bibnetPresentatie bibnet
Presentatie bibnet
 
Exchange infrastructure implementing single domain namespace scheme part 2#...
Exchange infrastructure  implementing single domain namespace scheme  part 2#...Exchange infrastructure  implementing single domain namespace scheme  part 2#...
Exchange infrastructure implementing single domain namespace scheme part 2#...
 
Exchange clients and their public facing exchange server part 13#36
Exchange clients and their public facing exchange server  part 13#36Exchange clients and their public facing exchange server  part 13#36
Exchange clients and their public facing exchange server part 13#36
 

Similar to My E-mail appears as spam | The 7 major reasons | Part 5#17

2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
Host It Smart
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths Debunked
Yes Lifecycle Marketing
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
DeepakYadav1095
 
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketoThe 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
Maria Pau, Intl' Best Selling Author, Multiple Award-Winning Coach
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Ralph Paglia
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Email Marketing 2010 By Chinnie Hidalgo Diaz
Email Marketing 2010 By Chinnie Hidalgo DiazEmail Marketing 2010 By Chinnie Hidalgo Diaz
Email Marketing 2010 By Chinnie Hidalgo Diaze-Learning Edge
 
Email marketing for your business.
Email marketing for your business.Email marketing for your business.
Email marketing for your business.
johnmozdalif
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
Patricia Rountree
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahooLisa Lindsay
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
InamDurrani2
 
7 module web based email
7 module web based email7 module web based email
7 module web based emailRozell Sneede
 
How to Use Mail Chimp
How to Use Mail Chimp How to Use Mail Chimp
How to Use Mail Chimp
Mhavic Cabalsi
 

Similar to My E-mail appears as spam | The 7 major reasons | Part 5#17 (20)

2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths Debunked
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketoThe 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
The 8-biggest-mistakes-email-marketers-make-how-to-avoid-them-marketo
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1
 
139 digital dealer6emailiskillingyouv1
139 digital dealer6emailiskillingyouv1139 digital dealer6emailiskillingyouv1
139 digital dealer6emailiskillingyouv1
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1
 
Final paper
Final paperFinal paper
Final paper
 
Email Marketing 2010 By Chinnie Hidalgo Diaz
Email Marketing 2010 By Chinnie Hidalgo DiazEmail Marketing 2010 By Chinnie Hidalgo Diaz
Email Marketing 2010 By Chinnie Hidalgo Diaz
 
Email marketing for your business.
Email marketing for your business.Email marketing for your business.
Email marketing for your business.
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
Spam!
Spam!Spam!
Spam!
 
How to Use Mail Chimp
How to Use Mail Chimp How to Use Mail Chimp
How to Use Mail Chimp
 

More from Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Eyal Doron
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Eyal Doron
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Eyal Doron
 

More from Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

My E-mail appears as spam | The 7 major reasons | Part 5#17

  • 1. Page 1 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com MY E-MAIL APPEARS AS SPAM | THE 7 MA JOR REASONS | PART 5#17 In the following article and the next article (My E-mail appears as spam | The 7 major reasons | Part 6#17), we will review six major reasons that could lead to a scenario in which E-mail that is sent from our organization, identified as spam E-mail. In the current article we will review the following causes:  E-mail content  Violation of the SMTP standards  BulkMass mail In our journey to become internal outbound spam professionals (unfortunately, at the current time, there is currently no such university degree), we will need to:
  • 2. Page 2 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com 1. Know about the major causes for internal outbound spam scenario. 2. Know what troubleshooting tools to use for detects the specific cause. 3. Know what steps need to be implemented for avoiding such causes. Note – the last major reason for: “My E-mail appears as spam” is related to the SPF record infrastructure. We will review the subject of the SPF record in two dedicated articles:  What is SPF record good for? | Part 7#17  Implementing SPF record | Part 8#17 1. E-mail content
  • 3. Page 3 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com A commercial E-mail (Marketing E-mail, mailing list, newsletters, etc.) that is written improperly, could easily lead to a scenario in which mail that is sent from your organization, will be recognized and classified as spamjunk mail. The mail specific content, is one of the major causes of the internal outbound spam problem. The three major factors, which are responsible for a “problematic mail content” are:  Specific words, phrases and writing style  HTML coding  Commercial E-mail “rules” 1. Mail content | specific words, phrases and writing style Avoid from writing a content that could be recognized as spam.
  • 4. Page 4 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com It’s highly recommended, to learn through about the subject of: how to write commercial E-mail in the “right way”. The article: How to Avoid Spam Filters include good examples of E- mail content, which could be classified as spam or a “spammy criterion”. For example E-mail that include one or more of the following charters:  Using phrases like “Click here!” or “Once in a lifetime opportunity!”  Excessive use of exclamation points!!!!!!!!!  USING ALL CAPS, WHICH IS LIKE SCREAMING AT THE TOP OF YOUR LUNGS VIA EMAIL (especially in the subject line).  Using bright red or green colored fonts.” 2. Bad HTML coding Using a “Bad HTML coding” in your commercial E-mail, could lead to a scenario, which attract attention of spam filters. An examples for “Bad HTML coding” appear in the excellent article: Most Common Spam Filter Triggers 1. BODY: HTML has a low ratio of text to image area (1,217 matches) 2. BODY: Message only has text/html MIME parts (971) 3. BODY: HTML has a low ratio of text to image area (729) 4. BODY: HTML and text parts are different (625) 5. Subject is all capitals (324) 6. BODY: HTML and text parts are different (279) 7. BODY: HTML: images with 2400-2800 bytes of words (211)
  • 5. Page 5 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com 3. Violation of 
“Marketing mail rules”| Use the concept of: “permission-based emails” When an organization uses the option of: “marketing mail”, we can define two major groups: 1. Spam mail or an unsolicited E-mail 2. Legitimate marketing mail described as – permission-based email marketing (also known as opt-in email). The meaning of: permission- based email marketing “ is – sending commercial E-mail to people who have asked to receive them. When sending a commercial E-mail to a distribution list, the basic assumption is that this “customer” asks or wants this E-mail message. In case that they want to stop getting our E-mails, they will need to have a way of asking us to stop sending then our E-mail. One of the most elements that can cause to external organization to classify your commercial E-mail is -the lack of the “un-subscribe option” that enable your customers to inform you that they are not interested in your marketing E-mails. Additional reading  Permission-based Email Marketing  Permission Based Marketing Policy  Permission Marketing  Opt-in email  opt-in e-mail  What is an Opt-In List?  Email Opt-In: Single Opt-In Versus Double Opt-In
  • 6. Page 6 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Your E-mail spam score When your E-mail is reaching to the destination mail infrastructure, most of the “destination mail systems” will scan and verify the “integrity” of the E-mail item. For example: a spam filter that will scan your E-mail items and “stamp” your E-mail with a “spam score”. The “spam score” is created after the specific mail infrastructure checks your E-mail message by using different parameters. Each of the different parameters gets a specific score. In case that your E-mail item exceeds a certain threshold, your email will be classified as spamjunk mail and the outcome could be a scenario in which your E-mail will be deleted by the destination mail server or, your E-mail will be stamped as “spam mail”, which will lead to the scenario of: E-mail message goes to the junk folder.
  • 7. Page 7 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Additional reading  How to Avoid Spam Filters  Most Common Spam Filter Triggers How to Write E-mail Content to Avoid the Dreaded Spam Filter  Is Your Email Marketing CAN-SPAM Compliant? 7 Common Mistakes People Make  A Marketer’s Guide to Getting Past Email Spam Filters  What To Do to Avoid Being Flagged as Spam?  Email Tips to Avoid Spam Filters and 9 Top Email Marketing Tools  Avoiding the Spam Folder: Email Marketing Best Practices  10 Tips to Keep Email Out of the Spam Folder Best practice and recommendation for commercial E-mail Test your “Marketing E-mail” spam score In case that you have prepared a commercial E-mail, and you are going to send this mail to your customer, wait! Before you hit the “send mail” key, which will send your E-mail to tens, hundreds or even thousands of recipients, it is highly recommended that you implement some kind of “spam testing procedure” that will enable you to get information about the “spam score” of your specific E-mail message.
  • 8. Page 8 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com There are several “free online services” that will enable you to examine the marketing E-mail that you are going to send to your customer. In the following section, we will demonstrate a nice and interesting tool: Test the Spammyness of your Emails (https://www.mail- tester.com) This web based tool, can help us to get the value of the spam score and additionally, in case that the “spam test” discovers possible issues, the information is displayed in easy to understand way. In the following screenshot, we can see that “spam test” result that we got by testing a specific E-mail item.
  • 9. Page 9 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com In our scenario, we can see that the score that we got (8 from 10) is because there are some issues. The “main issue” in our scenario, is that the organization domain name appears in one blacklist. When clicking on the “red scare”, we can get a detailed view that shows us, the list of the blacklist providers was checked + the backlist provider that registered our domain as blacklisted.
  • 10. Page 10 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Additional reading  Test the Spammyness of your Emails  Email Spam Checker  Email Spam Test  postmarkapp  Lyris ContentChecker for Email  isnotspam 2. Violation of the SMTP standards One if the prominent signs for spam E-mail, is an E-mail message that “violate” SMTP standards. Spammers use this “violation of the SMTP standards” for covering their tracks or deceive the destination recipient. For example: by
  • 11. Page 11 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com “declaring” that the E-mail was sent from X while, in reality, the E-mail message was sent from Y. The problem is that sometime, even a legitimate organization that sends a “legitimate commercial E-mail”, could be sent out E-mails that could look to the destination side, as a “suspicious E-mail” or E- mail that violates SMTP standards. A possible example of signs, which can lead to a scenario in which an E-mail message will be identified a spamJunk mail could be: 1. From: and Reply To: address is different: In a “standard” E-mail message, the “From” filed and the: “Reply To” filed include the same recipient name (E-mail address). The scenario in which the From: and “Reply To”: address is different, could be a sign of spamJunk mail, but at the same time, this is also very common with the newsletter’s E-mails. The Message subject contains an E-mail address. Spammers use this method to mislead the destination recipient and make him think that the E-mail message is legitimate. 2. Empty To: field: Spammers use this method because they send bulk E-mail to hundreds or even thousands of recipients and, they want to hide this information from the destination recipient. For this reason, they add the list of the destination recipient to the BCC field. Additional reading  How to effectively stop spam and junk mail  Top 10 spam characteristics (#1-5)
  • 12. Page 12 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com  The top 10 spam characteristics (#6-10)  FC822: Standard for ARPA Internet Text Messages 3. BulkMass mail One of the most common risks when sending a commercial E-mail to a large number of recipients is – that external mail system will recognize your mail server as a “bulk mailer’s server” and, for this reason, E-mails that will be sent from your mail server are we classified as spamJunk mail. Q: Does Exchange Online “identify” outbound bulk mail scenarios? A: The answer is: “Yes”, an Exchange use spam filter that uses a rating system named: Bulk Complaint Level (BCL) rating. As far as I know, the method of Bulk Complaint Level (BCL) rating is used only by “Exchange based mail servers”. Regarding outbound spam mail, in case that the Exchange Online recognizes a scenario which can be considered as “bulk mail”, the E- mail message will be routed to the Exchange Online- High Risk Delivery Pool and in more critical cases, the Office 365 recipients will be blocked and will not be able to continue to send Outlook E-mail messages. Attached a quote from the Microsoft MSDN blog: Disabling of offending accounts when they send too much email marked as spam
  • 13. Page 13 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Even though we segregate our spam and non-spam into two separate outbound IP pools, the email accounts cannot send spam indefinitely. We monitor which accounts are sending spam and if it exceeds a limit, the account is blocked from sending spam. [Source of information: Understanding outbound spam controls in Office 365 ] Additional reading  Bulk Complaint Level values  Take Advantage of EOPs new Bulk Mail Detection  Different Levels of Bulk Mail filtering in Office 365  What’s the difference between junk email and bulk email?  Use transport rules to configure bulk email filtering  Block spam this holiday season with the new enhanced bulk mail experience in EOP Q: Can I use Exchange Online as a solution for bulk E-mail? A: The simple answer is: No! Let’s start from the end: Office 365 and Exchange Online is not the “right” infrastructure for implementing a business need of bulk mail. Technically speaking, the Exchange Online infrastructure “allow” a maximum of 10,000 mail items per users but, there is an additional limitation such as the maximum number of mail items per hour and more. The “declaration” that Exchange Online is not considered as suitable solution for bulk E-mail, appear in the public Microsoft article: Exchange Online Limits
  • 14. Page 14 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Exchange Online customers who need to send legitimate bulk commercial email (for example, customer newsletters) should use third-party providers who specialize in these services. Another source of information that relates to subjects of bulk E-mail, appear in the article: Understanding outbound spam controls in Office 365 b) Use a 3rd party bulk emailer to send the mass communication There are several 3rd party bulk emailers whose sole business it is to send bulk email. They can work with customers to ensure that they have been well emailing practices, and they have resources dedicated to enforcing it. The Messaging, Mobile, Malware Anti-Abuse Working Group (MAAWG) publishes its membership roster here: http://www.maawg.org/about/roster Several bulk email providers are on the list and are known to be responsible Internet citizens. Note – you can read additional information about this subject in the article: Commercial E-mail – Using the right tools | Office 365 | Part 4#17 Q: What could be considered as a suitable solution for bulk E-mail? A: The simple answer is: using a third party provider, that specialized in providing a solution of bulk E-mail. Q: Can you recommend or provide me a name of such bulk mail providers?
  • 15. Page 15 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com A: You will have to look for yourself for this kind of services. If it helps, there are websites such as: “Anti-Abuse Working Group (MAAWG) (https://www.m3aawg.org/about/roster), which provide a list or “recommended” or well know bulk mail
  • 16. Page 16 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com providers
  • 17. Page 17 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Additional reading  Exchange Online Limits  Bulk email software Internal outbound spam in Office 365 environment | Article series index A quick reference for the article series My E-mail appears as a spam | Article series index | Part 0#17 The article index of the complete article series Introduction to the concept of internal outbound spam in general and in Office 365 and Exchange Online environment My E-mail appears as a spam – Introduction | Office 365 | Part 1#17 The psychological profile of the phenomenon: “My E-mail appears as a spam!”, possible factors for causing our E-mail to appear a “spam mail”, the definition of internal outbound spam.
  • 18. Page 18 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Internal spam in Office 365 – Introduction | Part 2#17 Review in general the term: “internal outbound spam”, miss conceptions that relate to this term, the risks that are involved in this scenario, outbound spam E-mail policy and more. Internal spam in Office 365 – Introduction | Part 3#17 What are the possible reasons that could cause to our mail to appear as spamjunk mail, who or what are this “elements”, that can decide that our mail is a spam mail?, what are the possible “reactions” of the destination mail infrastructure that identify our E- mail as spamjunk mail?. Commercial E-mail – Using the right tools | Office 365 | Part 4#17 What is commercial E-mail? Commercial E-mail as part of the business process. Why do I think that Office 365 Exchange Online is unsuitable for the purpose of commercial E-mail? Introduction if the major causes for a scenario in which your organization E-mail appears as spam
  • 19. Page 19 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com My E-mail appears as spam | The 7 major reasons | Part 5#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail: 1. E-mail content, 2. Violation of the SMTP standards, 3. BulkMass mail My E-mail appears as spam | The 7 major reasons | Part 6#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail: 4. False positive, 5. User Desktop malware, 6. “Problematic” Website Introduction if the subject of SPF record in general and in Office 365 environment What is SPF record good for? | Part 7#17 The purpose of the SPF record and the relation to for our mail infrastructure. How does the SPF record enable us to prevent a scenario in which hostile elements could send E-mail on our behalf.
  • 20. Page 20 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Implementing SPF record | Part 8#17 The “technical side” of the SPF record: the structure of SPF record, the way that we create SPF record, what is the required syntax for the SPF record in an Office 365 environment + mix mail environment, how to verify the existence of SPF record and so on. Introduction if the subject of Exchange Online - High Risk Delivery Pool High Risk Delivery Pool and Exchange Online | Part 9#17 How Office 365 (Exchange Online) is handling a scenario of internal outbound spam by using the help of the Exchange Online- High Risk Delivery Pool. High Risk Delivery Pool and Exchange Online | Part 10#17 The second article about the subject of Exchange Online- High Risk Delivery Pool. The troubleshooting path of internal outbound spam scenario
  • 21. Page 21 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com My E-mail appears as spam – Troubleshooting path | Part 11#17 Troubleshooting scenario of internal outbound spam in Office 365 and Exchange Online environment. Verifying if our domain name is blacklisted, verifying if the problem is related to E-mail content, verifying if the problem is related to specific organization user E-mail address, moving the troubleshooting process to the “other side. My E-mail appears as spam | Troubleshooting – Domain name and E-mail content | Part 12#17 Verify if our domain name appears as blacklisted, verify if the problem relates to a specific E-mail message content, registering blacklist monitoring services, activating the option of Exchange Online outbound spam. My E-mail appears as spam | Troubleshooting – Mail server | Part 13#17 What is the meaning of: “our mail server”?, Mail server IP, host name and Exchange Online. One of our users got an NDR which informs him, that his mail server is blacklisted!, How do we know that my mail server is blacklisted?
  • 22. Page 22 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17 The troubleshooting path logic. Get the information from the E-mail message that was identified as spamNDR. Forwarding a copy of the NDR message or the message that saved to the junk mail My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17 Step B – Get information about your Exchange Online infrastructure, Step C – fetch the information about the Exchange Online IP address, Step D – verify if the “formal “Exchange Online IP address a De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Review the charters of a scenario in which your organization appears as blacklisted. The steps and the operations that need to be implemented for de-list your organization from a blacklist. Summery and recap of the troubleshooting and best practices in a scenario of internal outbound spam
  • 23. Page 23 of 23 | My E-mail appears as spam | The 7 major reasons | Part 5#17 Written by Eyal Doron | o365info.com Dealing and avoiding internal spam | Best practices | Part 17#17 Provide a short checklist for all the steps and the operation that relates to a scenario of – internal outbound spam.