SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
GFI White Paper

     Greylisting:
 Decrease junk mail,
increase productivity
Contents
                   The basic premise                     3
                   How greylisting works                 3
                   Impact on mail flow                   3
                   Enabling greylisting                  3




Greylisting: Decrease junk mail, increase productivity       2
The goal of GFI MailEssentials Complete Online™ is to improve business productivity by reducing the volume of
junk mail and time spent managing it. Achieving this goal is akin to duplicating what email users experienced
back in 1994-95, when almost all email messages were ‘legitimate’ and extremely little time or effort was spent
dealing with junk email. While MailEssentials Complete Online detects a vast majority of today’s junk email, we
are continually working on new approaches to combat the increasing sophistication of spammers and reduce
time spent managing whitelists and blacklists, reviewing quarantines and digests and other tasks. Greylisting is
one of the ways MailEssentials Complete Online reduces junk mail and saves you time.

The basic premise
The concept is simple. The first time a given mailbox receives a message from a given sender, we respond
to the sending mail server with a temporary rejection message, asking the server to try again. (This happens
during the SMTP conversation and is transparent to end-users.) With legitimate email, the sending mail server
tries again a few minutes later, at which time we accept the message. Most spam messages are sent using
software that will not retry the delivery. These messages will never arrive in MailEssentials Complete Online’s
quarantine or the user’s inbox. With Greylisting, you’ll save valuable time once spent scanning the quarantine,
daily digest or a user’s spam folder thanks to a greatly reduced volume of spam messages.

How greylisting works
For each incoming message, three elements are examined in the early part of the SMTP conversation: the
sender IP address, the sender email address and the recipient email address. If this is the first time this email
‘relationship’ has been identified, a temporary deferral message is issued to the sending mail server − before
the DATA portion of the email is sent. That relationship is then “greylisted.”
If or when within a finite time period that same set of sender IP address, sender email address and recipient
email address is seen again – as would be expected with any legitimate email – the combination is
“whitelisted”, so that the message, as well as future messages with that relationship, are accepted immediately,
without temporary deferral. The whitelisting remains in place for upwards of a month.
After a message passes through the greylisting, it’s processed as usual. Any spam message that is greylisted
and re-tried will be subjected to the same stringent message analysis techniques as in cases where greylisting
is not used.
GFI Software conducted a greylisting test of one million messages and found that less than 75,000 spam
messages were retried – meaning over 90% of junk mail was blocked by greylisting alone.

Impact on mail flow
Greylisting by its nature can introduce delays in message flow, but these delays are generally brief and non-
recurring for a given recipient-sender combination.
The length of delay is dependent on how long a sending mail server waits before re-sending a message.
While a few sending mail servers – typically those used for high-volume mailings – will have a relatively long
retry interval of an hour or more, most mail servers will automatically re-send a temporarily deferred message
in 15 minutes or less.
Additionally, since the email ‘relationship’ described above (sender IP address, sender email address, and
recipient email address) is whitelisted after a single temporary deferral, there should be no subsequent delays
after that initial message.
Last but not least, any sender addresses that are whitelisted by a user or domain administrator are not greylisted.

Enabling greylisting
Greylisting can be enabled or disabled at any time on a domain-wide basis, via the MailEssentials Complete
Online control panel.




Greylisting: Decrease junk mail, increase productivity                                                              3
USA, CANADA AND CENTRAL AND SOUTH AMERICA




                                                                                                                                                                                               GFI 2412 oct11
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA
Telephone: +1 (888) 688-8457
Fax: +1 (727) 562-5199
ussales@gfi.com



UK AND REPUBLIC OF IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE, MIDDLE EAST AND AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA AND NEW ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com


For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Weitere ähnliche Inhalte

Ähnlich wie Email Continuity

How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian MailHelp Now, LLC
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology featuresShweta Jain
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email SecureShawn Jordan
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfBalaramaRaju2
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)webhostingguy
 
Top 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorTop 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorThomas Donofrio
 
10 ways mail can help you prosper in a gdpr world infographic
10 ways mail can help you prosper in a gdpr world   infographic10 ways mail can help you prosper in a gdpr world   infographic
10 ways mail can help you prosper in a gdpr world infographicAndy Hawkins
 
Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Digital Wavefront
 
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...HandySends
 

Ähnlich wie Email Continuity (20)

How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian Mail
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
Greylisting
GreylistingGreylisting
Greylisting
 
Email bagging
Email baggingEmail bagging
Email bagging
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology features
 
Message Flow
Message FlowMessage Flow
Message Flow
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email Secure
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdf
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
MessageFlow
MessageFlowMessageFlow
MessageFlow
 
AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)AppRiver Disaster Recovery (PowerPoint)
AppRiver Disaster Recovery (PowerPoint)
 
The Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email MarketingThe Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email Marketing
 
Top 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag AcceleratorTop 10 Questions Green Flag Accelerator
Top 10 Questions Green Flag Accelerator
 
10 ways mail can help you prosper in a gdpr world infographic
10 ways mail can help you prosper in a gdpr world   infographic10 ways mail can help you prosper in a gdpr world   infographic
10 ways mail can help you prosper in a gdpr world infographic
 
Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery Create Email Marketing Awesomeness from Design to Delivery
Create Email Marketing Awesomeness from Design to Delivery
 
NEDMA14: Creating Email Awesomeness! - Nirmal Parikh
NEDMA14: Creating Email Awesomeness! - Nirmal ParikhNEDMA14: Creating Email Awesomeness! - Nirmal Parikh
NEDMA14: Creating Email Awesomeness! - Nirmal Parikh
 
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
Email Deliverability, SMTP & Transactional Emails by HandySends | Twillo Send...
 

Mehr von GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Binary translation
Binary translationBinary translation
Binary translationGFI Software
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI Software
 

Mehr von GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Binary translation
Binary translationBinary translation
Binary translation
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment Strategies
 

Kürzlich hochgeladen

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Email Continuity

  • 1. GFI White Paper Greylisting: Decrease junk mail, increase productivity
  • 2. Contents The basic premise 3 How greylisting works 3 Impact on mail flow 3 Enabling greylisting 3 Greylisting: Decrease junk mail, increase productivity 2
  • 3. The goal of GFI MailEssentials Complete Online™ is to improve business productivity by reducing the volume of junk mail and time spent managing it. Achieving this goal is akin to duplicating what email users experienced back in 1994-95, when almost all email messages were ‘legitimate’ and extremely little time or effort was spent dealing with junk email. While MailEssentials Complete Online detects a vast majority of today’s junk email, we are continually working on new approaches to combat the increasing sophistication of spammers and reduce time spent managing whitelists and blacklists, reviewing quarantines and digests and other tasks. Greylisting is one of the ways MailEssentials Complete Online reduces junk mail and saves you time. The basic premise The concept is simple. The first time a given mailbox receives a message from a given sender, we respond to the sending mail server with a temporary rejection message, asking the server to try again. (This happens during the SMTP conversation and is transparent to end-users.) With legitimate email, the sending mail server tries again a few minutes later, at which time we accept the message. Most spam messages are sent using software that will not retry the delivery. These messages will never arrive in MailEssentials Complete Online’s quarantine or the user’s inbox. With Greylisting, you’ll save valuable time once spent scanning the quarantine, daily digest or a user’s spam folder thanks to a greatly reduced volume of spam messages. How greylisting works For each incoming message, three elements are examined in the early part of the SMTP conversation: the sender IP address, the sender email address and the recipient email address. If this is the first time this email ‘relationship’ has been identified, a temporary deferral message is issued to the sending mail server − before the DATA portion of the email is sent. That relationship is then “greylisted.” If or when within a finite time period that same set of sender IP address, sender email address and recipient email address is seen again – as would be expected with any legitimate email – the combination is “whitelisted”, so that the message, as well as future messages with that relationship, are accepted immediately, without temporary deferral. The whitelisting remains in place for upwards of a month. After a message passes through the greylisting, it’s processed as usual. Any spam message that is greylisted and re-tried will be subjected to the same stringent message analysis techniques as in cases where greylisting is not used. GFI Software conducted a greylisting test of one million messages and found that less than 75,000 spam messages were retried – meaning over 90% of junk mail was blocked by greylisting alone. Impact on mail flow Greylisting by its nature can introduce delays in message flow, but these delays are generally brief and non- recurring for a given recipient-sender combination. The length of delay is dependent on how long a sending mail server waits before re-sending a message. While a few sending mail servers – typically those used for high-volume mailings – will have a relatively long retry interval of an hour or more, most mail servers will automatically re-send a temporarily deferred message in 15 minutes or less. Additionally, since the email ‘relationship’ described above (sender IP address, sender email address, and recipient email address) is whitelisted after a single temporary deferral, there should be no subsequent delays after that initial message. Last but not least, any sender addresses that are whitelisted by a user or domain administrator are not greylisted. Enabling greylisting Greylisting can be enabled or disabled at any time on a domain-wide basis, via the MailEssentials Complete Online control panel. Greylisting: Decrease junk mail, increase productivity 3
  • 4. USA, CANADA AND CENTRAL AND SOUTH AMERICA GFI 2412 oct11 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com 33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA Telephone: +1 (888) 688-8457 Fax: +1 (727) 562-5199 ussales@gfi.com UK AND REPUBLIC OF IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.