SlideShare a Scribd company logo
My E-mail appears as spam | Troubleshooting
- Domain name and E-mail content
| Part 12#17
Eyal Doron o365info.com
2
• What is the true meaning of: “My E-mail appears as spam” in an Office
365 environment?
• Implementing an effective troubleshooting process
• The troubleshooting path of my E-mail appears as spam in an Office 365
environment
AGENDA
3
• 1. Verifying if our organization domain name appears as blacklisted.
• 2. Verifying if the problem relates to a specific E-mail content.
• 3. “Catch” outbound spam mail Using – Exchange Online outbound
spam (Exchange Online outbound spam option).
• 4. Monitor a scenario in which your organization appears in a blacklist.
AGENDA
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
Eyal Doron o365info.com
EyalDoron o365info.com

More Related Content

Viewers also liked

Summer office prt_how_to_2.0-allprt
Summer office prt_how_to_2.0-allprtSummer office prt_how_to_2.0-allprt
Summer office prt_how_to_2.0-allprt4experience
 
Lenhtimkiemgooogle
LenhtimkiemgooogleLenhtimkiemgooogle
LenhtimkiemgooogleTran Tuan
 
미사교 환경Ngo 최종
미사교 환경Ngo 최종미사교 환경Ngo 최종
미사교 환경Ngo 최종수현 하하
 
ورقة عمل حساب
ورقة عمل حسابورقة عمل حساب
ورقة عمل حسابmuhmadbdran
 
gazelle.pdf
gazelle.pdfgazelle.pdf
gazelle.pdfsptlove
 
Evaluation: Question 6
Evaluation: Question 6Evaluation: Question 6
Evaluation: Question 6smdoyle
 
20130109 het abc van sociale media ertvelde
20130109 het abc van sociale media ertvelde20130109 het abc van sociale media ertvelde
20130109 het abc van sociale media ertveldekwb_eensgezind
 
Webinar 2013 12-10-presentazione_jm
Webinar 2013 12-10-presentazione_jmWebinar 2013 12-10-presentazione_jm
Webinar 2013 12-10-presentazione_jmsmespire
 
INSPIRED Magazine Vol 02 Issue 01
INSPIRED Magazine Vol 02 Issue 01INSPIRED Magazine Vol 02 Issue 01
INSPIRED Magazine Vol 02 Issue 01Amy Bensema
 
Leveraging the AWS Cloud to Create Scalable Research Performance Analytics
Leveraging the AWS Cloud to Create Scalable Research Performance AnalyticsLeveraging the AWS Cloud to Create Scalable Research Performance Analytics
Leveraging the AWS Cloud to Create Scalable Research Performance AnalyticsHPCC Systems
 
Reyrey pecha kucha
Reyrey pecha kucha Reyrey pecha kucha
Reyrey pecha kucha maiterey
 
Trends in SAP Data Centers
Trends in SAP Data CentersTrends in SAP Data Centers
Trends in SAP Data CentersDirk Oppenkowski
 
Artikel 10 1 malaysia - pendidikan asas transformasi negara sejahtera
Artikel 10   1 malaysia - pendidikan asas transformasi negara sejahteraArtikel 10   1 malaysia - pendidikan asas transformasi negara sejahtera
Artikel 10 1 malaysia - pendidikan asas transformasi negara sejahteraNor Hazimah Othman
 
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadManual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadAlicia Quispe
 
Personalizing Forum Search using Multidimensional Random Walks
Personalizing Forum Search using Multidimensional Random WalksPersonalizing Forum Search using Multidimensional Random Walks
Personalizing Forum Search using Multidimensional Random WalksAmélie Marian
 

Viewers also liked (20)

Summer office prt_how_to_2.0-allprt
Summer office prt_how_to_2.0-allprtSummer office prt_how_to_2.0-allprt
Summer office prt_how_to_2.0-allprt
 
Lenhtimkiemgooogle
LenhtimkiemgooogleLenhtimkiemgooogle
Lenhtimkiemgooogle
 
marketing management
marketing managementmarketing management
marketing management
 
미사교 환경Ngo 최종
미사교 환경Ngo 최종미사교 환경Ngo 최종
미사교 환경Ngo 최종
 
ورقة عمل حساب
ورقة عمل حسابورقة عمل حساب
ورقة عمل حساب
 
gazelle.pdf
gazelle.pdfgazelle.pdf
gazelle.pdf
 
Evaluation: Question 6
Evaluation: Question 6Evaluation: Question 6
Evaluation: Question 6
 
20130109 het abc van sociale media ertvelde
20130109 het abc van sociale media ertvelde20130109 het abc van sociale media ertvelde
20130109 het abc van sociale media ertvelde
 
Webinar 2013 12-10-presentazione_jm
Webinar 2013 12-10-presentazione_jmWebinar 2013 12-10-presentazione_jm
Webinar 2013 12-10-presentazione_jm
 
INSPIRED Magazine Vol 02 Issue 01
INSPIRED Magazine Vol 02 Issue 01INSPIRED Magazine Vol 02 Issue 01
INSPIRED Magazine Vol 02 Issue 01
 
Leveraging the AWS Cloud to Create Scalable Research Performance Analytics
Leveraging the AWS Cloud to Create Scalable Research Performance AnalyticsLeveraging the AWS Cloud to Create Scalable Research Performance Analytics
Leveraging the AWS Cloud to Create Scalable Research Performance Analytics
 
Reyrey pecha kucha
Reyrey pecha kucha Reyrey pecha kucha
Reyrey pecha kucha
 
Si spersonalizzante
Si spersonalizzanteSi spersonalizzante
Si spersonalizzante
 
Web2
Web2Web2
Web2
 
Trends in SAP Data Centers
Trends in SAP Data CentersTrends in SAP Data Centers
Trends in SAP Data Centers
 
Artikel 10 1 malaysia - pendidikan asas transformasi negara sejahtera
Artikel 10   1 malaysia - pendidikan asas transformasi negara sejahteraArtikel 10   1 malaysia - pendidikan asas transformasi negara sejahtera
Artikel 10 1 malaysia - pendidikan asas transformasi negara sejahtera
 
питание23
питание23питание23
питание23
 
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadManual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
 
Personalizing Forum Search using Multidimensional Random Walks
Personalizing Forum Search using Multidimensional Random WalksPersonalizing Forum Search using Multidimensional Random Walks
Personalizing Forum Search using Multidimensional Random Walks
 
MoDevUx Brain Secrets
MoDevUx Brain SecretsMoDevUx Brain Secrets
MoDevUx Brain Secrets
 

Similar to My E-mail appears as spam - troubleshooting - domain name and E-mail content - part 12 of17

De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...Eyal Doron
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17Eyal Doron
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17Eyal Doron
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
 
eTapestry Internet Fundraising Strategies Seminar
 eTapestry Internet Fundraising Strategies Seminar eTapestry Internet Fundraising Strategies Seminar
eTapestry Internet Fundraising Strategies SeminareTapestryCate
 
3. Deliverability: Navigating the Murky Waters of Email Deliverability
3. Deliverability: Navigating the Murky Waters of Email Deliverability3. Deliverability: Navigating the Murky Waters of Email Deliverability
3. Deliverability: Navigating the Murky Waters of Email DeliverabilityVivastream
 
Lee Chadwick - OTE Bristol - Email Marketing
Lee Chadwick - OTE Bristol - Email MarketingLee Chadwick - OTE Bristol - Email Marketing
Lee Chadwick - OTE Bristol - Email MarketingEdge Global Media Group
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best PracticesJennifer Soares
 
Spam Traps: Avoid the Blacklist and Protect Your Digital Reputation
Spam Traps: Avoid the Blacklist and Protect Your Digital ReputationSpam Traps: Avoid the Blacklist and Protect Your Digital Reputation
Spam Traps: Avoid the Blacklist and Protect Your Digital ReputationAct-On Software
 
eTapestry Webinar
eTapestry WebinareTapestry Webinar
eTapestry Webinarkrucker
 
ARIN 34 ARIN Customer Survey Report
ARIN 34 ARIN Customer Survey ReportARIN 34 ARIN Customer Survey Report
ARIN 34 ARIN Customer Survey ReportARIN
 

Similar to My E-mail appears as spam - troubleshooting - domain name and E-mail content - part 12 of17 (11)

De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
eTapestry Internet Fundraising Strategies Seminar
 eTapestry Internet Fundraising Strategies Seminar eTapestry Internet Fundraising Strategies Seminar
eTapestry Internet Fundraising Strategies Seminar
 
3. Deliverability: Navigating the Murky Waters of Email Deliverability
3. Deliverability: Navigating the Murky Waters of Email Deliverability3. Deliverability: Navigating the Murky Waters of Email Deliverability
3. Deliverability: Navigating the Murky Waters of Email Deliverability
 
Lee Chadwick - OTE Bristol - Email Marketing
Lee Chadwick - OTE Bristol - Email MarketingLee Chadwick - OTE Bristol - Email Marketing
Lee Chadwick - OTE Bristol - Email Marketing
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best Practices
 
Spam Traps: Avoid the Blacklist and Protect Your Digital Reputation
Spam Traps: Avoid the Blacklist and Protect Your Digital ReputationSpam Traps: Avoid the Blacklist and Protect Your Digital Reputation
Spam Traps: Avoid the Blacklist and Protect Your Digital Reputation
 
eTapestry Webinar
eTapestry WebinareTapestry Webinar
eTapestry Webinar
 
ARIN 34 ARIN Customer Survey Report
ARIN 34 ARIN Customer Survey ReportARIN 34 ARIN Customer Survey Report
ARIN 34 ARIN Customer Survey Report
 

More from Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 

More from Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

My E-mail appears as spam - troubleshooting - domain name and E-mail content - part 12 of17

Editor's Notes

  1. The current articles and the next three articles, are dedicated troubleshooting process of the scenario, in which our organization E-mail appears as a spam mail (internal \ outbound spam). The current article is dedicated to the most basic and effective troubleshooting steps in which we verify the following parts: Verify if our domain name appears as blacklisted. Verify if the problem relates to a specific E-mail message content. In addition, we will also discuss the options of: Registering blacklist monitoring services. Activating the option of Exchange Online outbound spam.
  2. The initial event that “start” the “internal \ outbound spam drama”, is a complaint that we get from our organization user, about the problem in which his E-mail message was identified as spam\Junk mail by “other recipient”. When an organization user who says: “my mail” appears as spam, the true meaning is “our organization E-mail” appear as a spam because, the user is using our organization mail infrastructure.
  3. The term: “our organization mail” could be translated into two possible scenarios: Our organization domain name is blacklisted. Our organization’s mail server is blacklisted.
  4. In Exchange Online environment, the term: “Our organization mail server”, could be translated into two possible scenarios: The formal IP address of the Exchange Online server which represents our domain name is blacklisted. E-mail message that was sent from the Exchange Online High Risk Delivery Pool and “their” IP address is blacklisted.
  5. One of the most important subjects is a scenario of: internal \ outbound spam in an Office 365 environment is – to be able to choose the most effective troubleshooting steps that will lead us to the required solution. As we have mentioned before a couple of times, in Office 365 and Exchange Online environment, we could face a scenario in which our domain name will appear as blacklisted but, the chances for a scenario, in which “our mail server” (our Exchange Online mail server) could appear as blacklisted are very low.
  6. The only way that this scenario could be realized is when a problematic E-mail message that was sent by one of our Office 365 users, and routed to the Exchange Online High Risk Delivery Pool. In this case, the NDR that we get from the destination recipient could point out a problem that relates to “our mail server” (Exchange Online High Risk Delivery Pool) but the real problem is related to the E-mail message content, that was sent by the Office 365 users and not to the IP address that are used by the Exchange Online High Risk Delivery Pool. Conclusion In a scenario in which your organization E-mail is identified as a spam\Junk mail, allocate most of the troubleshooting effort in: “step 1 and step 2”. The meaning is – verify that your domain name is blacklisted and if so, do all the necessary operations to remove it from the blacklist and start an “internal investigation” that will help you to understand, what is the “problem” with the organization E-mail content that leads to this “unwanted scenario”, in which your organization E-mail appears as spam\Junk mail. Most of the time, you will not listen to my advice, and you will be sure that the main problem is related to the Office 365 mail servers (Exchange Online). The resources that you will allocate to this “direction” are quite useless but, it’s important to me to provide you a detailed description of: how to implement the troubleshooting steps in case that we suspect that the internal \ outbound spam issue relates to a problem in the Exchange Online server. In case that you think that the issue of internal \ outbound spam is related to the Exchange Online server, you can read detailed description of the troubleshooting steps in the following articles: My E-mail appears as spam | Troubleshooting – Mail server | Part 13#17 My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17 My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17
  7. In the current article, we will implement the troubleshooting process by using the following steps: The first operation that we need to implement is – to verify if our domain name appears as blacklisted and if so, make all the required arrangements for delisting our domain name. To prevent such future events we should consider using: Blacklist monitoring service Activate the Exchange Online outbound spam option In case that our domain name doesn’t appear as blacklisted, we should divert all our resources, to the task of – understand what was included in the E-mail message (E-mail content) that was sent by the Office 365 user. In other words: the E-mail message content, which lead to the undesirable scenario in which our organization E-mail identified as spam\Junk mail.
  8. When we say a sentence such as: “my organization appears in a blacklist!”, the term “organization” is not so clear. Technically, the term: “organization” can be translated into two main elements: The organization domain name Our organization’s mail server – the IP address of our organization’s mail server or, the Host name of our organization’s mail server. If we want to make it even more complicated – in an on-Premises mail environment, it’s easy to “point out” who are our organization’s mail server but, in Office 365 and Exchange Online environment, the answer to the questions: who are our organization’s mail servers, is a little more complicated.
  9. In the current article, we will focus on the task of: looking if our domain name appears in a blacklist. In the next articles: My E-mail appears as spam | Troubleshooting – Mail server | Part 13#17 My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17 My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17 We will review the implementation of the troubleshooting that relates to a scenario in which our mail server appears as blacklisted. We suspect that our domain name appears as blacklisted |Charters of this scenario. In the current section, we will focus on the first part of – how to find out if our organization domain name appears on a blacklist. There are many public websites, which enable us to check if our domain name (or the IP address of our mail server) appears as registered in a well-known blacklist. My personal preference is to start with the free web service that is offered by – mxtoolboxwebsite. I love to use this tool because, this site is very “user-friendly” and professional. Cross-referencing information about the blacklists. It’s important to mention that – the best practice is to check blacklist information about your organization at least in two different sites because, each site includes a different blacklist provides lists. Find out of our domain name appear as Blacklists | Using mxtoolbox In the following section, we will demonstrate how to get information about a specific domain name by using the Mxtoolbox web application. 1. Go to the mxtoolbox site and choose the Blacklists menu (http://mxtoolbox.com/blacklists.aspx) 2. In the box: Server IP or Domain adds your domain name and chooses: Blacklists check.
  10. In the following screenshot, we can see the result. In our scenario, it appears that the domain: o365info.com is “green and clean” meaning the domain name doesn’t appear in a well-known blacklist.
  11. As mentioned, the best practice is to crosscheck information, from several different sources of information. In the following screenshot, we can see an example on the additional web site (The complete IP checks for sending Mailservers - http://multirbl.valli.org/lookup/) that offer the option of checking, if our domain name appears in a well-known blacklist. Additional reading The following list, includes an additional web site that you can use to find out information about your domain name. The complete IP check for sending Mailservers RBL Database Lookup Blacklist Check lacklistalert Additional information 6 Ways To Find Out If You Are On The Google List Of Blacklisted Sites How do I know if I’m on a SPAM Blacklist?
  12. As mentioned, E-mail message content is one of the most common causes for a scenario of internal \ outbound spam.
  13. Given that we have an element the option of “our domain name is blacklisted”, the next most reasonable option is – the option that is related to the specific content of the E-mail message that was sent out by our organization user. The meaning is – E-mail content that violates some “commercial E-mail rules”, which lead into the scenario in which the “other side” identifies our E-mail message as spam mail. To be able to verify if the issue relates to the “E-mail message content”, all we need to do, just send again E-mail message to the same destination recipient, but this time, use a “neutral E-mail message” or in simple words: an empty E-mail message. In case that the E-mail message was successfully sent to the destination recipient, we can “breathe freely” and, know that our main task now is the “educate” our user about the “right rules” for commercial E-mail and in addition, monitor our mail infrastructure to be able to prevent similar events in the future. Another option that you can use is to test the spam score of the E-mail message. You can read more information about the subject of spam score in the article – My E-mail appears as spam | The 7 major reasons | Part 5#17 
  14. One of our main challenges in internal \ outbound spam scenario, is the ability to “know” about an event, in which Exchange Online classifies a specific E-mail message that sent out by one of our organization users as spam\junk mail. The good news is that Exchange Online offers us this option! The Exchange Online feature of outbound spam, enables us as Exchange Online administrators, to be notified each time when Exchange Online decides to classify E-mail messages that were sent by one of the organization users as “spam\junk mail”. This option could be very useful for us in case, that we know or suspect that some of the organization E-mail message identified a spam\junk mail but we don’t know: Who are the Office 365 users who sent this E-mail Message? What is the specific E-mail message that identified as spam\junk mail (the charters of the specific E-mail message)? Using (activating) of the Exchange Online option: outbound spam option, is quite simple: 1. In the Exchange Online admin center chose the protection menu. On the top menu bar: choose the outbound spam menu.
  15. In the option box: Send a copy of all suspicious outbound email messages to the following email address or addresses: add the E-mail address of the Office 365 recipients (such as the Exchange Online administrator) that will get a copy of this type of Office 365 E-mails. In the option box: Send a notification to the following email address or addresses when a sender is blocked from sending outbound spam: add the E-mail address of the Office 365 recipients (such as the Exchange Online administrator) that will get a copy of this type of Office 365 E-mails. Additional reading Configure the outbound spam policy Sample notification when a sender is blocked sending outbound spam
  16. Added an option that we could consider is: using some kind of blacklist monitoring services, that will alert us in case that our organization appears as blacklisted in well-known blacklists (our domain name or our mail server IP address).
  17. Q: Does Office 365 or Exchange Online include an option that will alert me in case that our organization is blacklisted? A: The answer is: “No”, in the current time Office 365 doesn’t offer such a service. There are a couple of “paid services “that offer this type of services in which your organization domain name and your mail server IP address will be checked regularly against well-known blacklists providers. In case that your domain name or your mail server IP address appears in one of this blacklist; you will be alerted immediately. Q: Why don’t all the organization use this type of services? A: I’m not sure that I know the right answer but, it looks to me that there are two main reasons: Lack of knowledge – many IT persons, are not aware of this type of services and to the importance of this service. Avoiding the cost of purchasing this type of “blacklist monitoring services”. I will not convince you to purchase this type of services, but instead, I want just to awaken your attention: Just take the time to think about the “cost” of this monitoring service versus the “business risk” in a scenario in which your domain name is blacklisted. What is the total financial loss of a scenario, in which your organization E-mail message, will not reach their destination? How long will it take until you are aware of the scenario in which your organization domain name is blacklisted? How easy is to implement the process of de-list? Is there any another damages to a scenario of internal \ outbound spam such as: damage to reputation of the company?
  18. Using a free blacklist monitored service. One of the options that you can consider, is using a free blacklist monitoring service that is provided by mxtoolbox. In the following screenshot, we can see how to access this service.
  19. As we all know, there are no free meals, the “free monitoring blacklist services” have limited options. In case that you need more options and capabilities, you will have to purchase paid service. In the following screenshot, we can see a comparison chart that displays what is included in the “free monitor” service versus the paid plans.