SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Page 1 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
MY E-MAIL APPEARS AS SPAM |
TROUBLESHOOTING – MAIL SERVER |
PART 14#17
In the current article and the next article: My E-mail
appears as spam | Troubleshooting – Mail server | Part
15#17, we will review the troubleshooting process of the
scenario – “our mail server appears as blacklisted” in
Office 365 and Exchange Online environment
Another variation of this scenario could be: a scenario, in
which we want to understand, if the problem in which
our organization E-mail is identified as spamjunk mail
relates to our mail server or to other possible issues.
Page 2 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
The troubleshooting path logic
Versus a scenario in which we use on-Premises mail
infrastructure, in case that our mail infrastructure is hosted at
Office 365 (Exchange Online), the troubleshooting logic and
steps that we will need to implement are different.
The “major component” in our troubleshooting path, includes
the following parts:
1. Get information from the E-mail message
The basis for our scenario is the information that appears in
the E-mail message. The “E-mail message” could be:
Page 3 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
 An NDR message that was sent to one of our organization users,
which inform him that “his mail server” (our organization
Exchange Online server) is blacklisted.
 A scenario, in which external recipient reports that – our E-mail
saved in his junk mail folder, and he sends us the E-mail
message header which include our mail server IP address.
To be able to start the troubleshooting process, we will need
to “extract” the IP address that appear in the NDR message
(the IP address of the Exchange Online server who appears as
blacklisted).
2. Get information about your Exchange Online
infrastructure
In an Exchange Online environment, we will need to get
information about the Exchange Online that represent our
domain: the Exchange Online hostname + IP address that is
“mapped” to our Exchange Online hostname.
3. Fetch the information about the Exchange Online IP
address
We will need to get the IP address of the “Office 365 mail
server” that sent out the E-mail message “on behalf” of the
Office 365 users to the destination recipient.
4. Verify if the “formal “Exchange Online IP address appear
as blacklisted.
This is the “cross-section” part, in which we want to verify if the
IP address that appear in the NDR message is related to our
Page 4 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
“formal Exchange Online server” or, to anther passable
scenario – Exchange Online- High Risk Delivery Pool.
Infer the necessary conclusions – based on the information
from the former step, we can decide what are the “operations”
that we will need to implement.
Get the information from the E-mail message
that was identified as spamNDR
In the following phase, we will need to “fetch” from the E-mail
message the required information about the mail server host
name or the IP address that was blacklisted.
We will need to ask our organization user who gets the NDR
message or the external recipient who informs us that our E-
mail saved in his junk mail folder, to send us a copy of the E-
mail message.
Page 5 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
Forwarding a copy of the NDR message or the
message that saved to the junk mail folder.
In a scenario in which we need to examine E-mail messages,
the best practice is to ask for a copy of the original E-mail
message.
The way for providing a “complete copy” of the E-mail message
is by forwarding a copy of the E-mail message.
Outlook and OWA mail client include the option of “forwarding
an E-mail message copy” but, not all the mail client support
this option.
For example: as far as I know, there is no option to send a
copy of the original E-mail message when using the Gmail mail
client (the option of “forwarding” E-mail doesn’t send the
Page 6 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
“complete E-mail message that included the original mail
headers).
In the following section, we will demonstrate how to forward
or copy of the “original E-mail message” by using Outlook and
OWA mail client.
1. Sending E-mail as attachment using Outlook
Outlook mail client includes the option that describes as
forward E-mail as an attachment.
1. Select the E-mail item
2. In the HOME menu, click on the more option and then click on
the forward as attachment
In the following screenshot, we can see the result – the E-mail
that was sent includes a copy of the original E-mail message.
Later, we can access the “original E-mail message” and
analyses the information that’s included in the E-mail message
header.
Page 7 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
2. Sending (forwarding) E-mail as attachment using OWA
1. Log into Office Web App (OWA).
2. Click on the option New.
3. Click the open separate window icon, located at the top right
corner of the message window. This will open this message as
its own window within your browser.
Page 8 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
4. Locate the “new E-mail window” side by side with the OWA
window.
5. Drag and drop the email from your mail folder in the window of
the new E-mail message
In the following screenshot, we can see the E-mail message
appears as an attachment in the “new E-mail message”
Getting the required information from the E-
mail header
In a scenario in which we need to “extract” the Exchange
Online server IP address from an E-mail message that was
sent to an external receipt, we will need to access the
information is “hidden”, in the E-mail message part
named: mail header.
Page 9 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
Getting the E-mail header when using Outlook mail client
1. Choose the specific E-mail message
2. Chose the File
Page 10 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
3. In the window that appears, click on the Properties
4. In the section named: Internet headers, you can see the content
of the mail header.
Page 11 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
5. Copy the information from the window and send the
information for further analysis.
Getting the E-mail header when using OWA mail client
1. Choose the specific E-mail message
2. Choose the “more option” icon (the three dots)
Page 12 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
3. Choose the option: View message details
4. In the pop out windows that appear, we can see the content of
the mail header.
Page 13 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
5. Copy the information from the window and send the
information for further analysis.
Getting the E-mail header when using Gmail mail client
The Gmail E-mail web client, doesn’t include an option for
forwarding E-mail message as an attachment.
The only option that we can use is asking for the user to send
us a copy of the E-mail header (the E-mail message that was
saved in his junk mail folder).
To be able to view the E-mail header when using Gmail mail
client, use the following procedure:
1. Open the message in your Gmail inbox.
Page 14 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
2. Click the down-arrow in the top-right corner of the message.
3. Click the “Show original” link toward the bottom of the option’s
box. The message will open in a separate window with the full
message headers at the top.
4. In the windows that appear, we can see the content of the mail
header.
Page 15 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
5. Copy the information from the window and send the
information for further analysis.
Additional reading
 How to view the full message headers of an email
Internal  outbound spam in Office 365
environment | Article series index
A quick reference for the article series
Page 16 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
My E-mail appears as a spam | Article
series index | Part 0#17
The article index of the complete
article series
Introduction to the concept of internal  outbound spam in general
and in Office 365 and Exchange Online environment
My E-mail appears as a spam –
Introduction | Office 365 | Part 1#17
The psychological profile of the
phenomenon: “My E-mail appears as
a spam!”, possible factors for causing
our E-mail to appear a “spam mail”,
the definition of internal  outbound
spam.
Internal spam in Office 365 –
Introduction | Part 2#17
Review in general the term: “internal 
outbound spam”, miss conceptions
that relate to this term, the risks that
are involved in this scenario,
outbound spam E-mail policy and
more.
Internal spam in Office 365 –
Introduction | Part 3#17
What are the possible reasons that
could cause to our mail to appear as
spamjunk mail, who or what are this
“elements”, that can decide that our
Page 17 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
mail is a spam mail?, what are the
possible “reactions” of the destination
mail infrastructure that identify our E-
mail as spamjunk mail?.
Commercial E-mail – Using the right
tools | Office 365 | Part 4#17
What is commercial E-mail?
Commercial E-mail as part of the
business process. Why do I think that
Office 365 Exchange Online is
unsuitable for the purpose of
commercial E-mail?
Introduction if the major causes for a scenario in which your
organization E-mail appears as spam
My E-mail appears as spam | The 7
major reasons | Part 5#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
1. E-mail content, 2. Violation of the
SMTP standards, 3. BulkMass mail
My E-mail appears as spam | The 7
major reasons | Part 6#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
Page 18 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
4. False positive, 5. User Desktop
malware, 6. “Problematic” Website
Introduction if the subject of SPF record in general and in Office
365 environment
What is SPF record good for? | Part
7#17
The purpose of the SPF record and the
relation to for our mail infrastructure.
How does the SPF record enable us to
prevent a scenario in which hostile
elements could send E-mail on our
behalf.
Implementing SPF record | Part 8#17
The “technical side” of the SPF record:
the structure of SPF record, the way
that we create SPF record, what is the
required syntax for the SPF record in
an Office 365 environment + mix mail
environment, how to verify the
existence of SPF record and so on.
Introduction if the subject of Exchange Online - High Risk Delivery
Pool
High Risk Delivery Pool and Exchange
Online | Part 9#17
How Office 365 (Exchange Online) is
handling a scenario of internal 
outbound spam by using the help of
Page 19 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
the Exchange Online- High Risk
Delivery Pool.
High Risk Delivery Pool and Exchange
Online | Part 10#17
The second article about the subject
of Exchange Online- High Risk
Delivery Pool.
The troubleshooting path of internal  outbound spam scenario
My E-mail appears as spam –
Troubleshooting path | Part 11#17
Troubleshooting scenario of internal 
outbound spam in Office 365 and
Exchange Online environment.
Verifying if our domain name is
blacklisted, verifying if the problem is
related to E-mail content, verifying if
the problem is related to specific
organization user E-mail address,
moving the troubleshooting process
to the “other side.
My E-mail appears as spam |
Troubleshooting – Domain name and
E-mail content | Part 12#17
Verify if our domain name appears as
blacklisted, verify if the problem
relates to a specific E-mail message
content, registering blacklist
monitoring services, activating the
Page 20 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
option of Exchange Online outbound
spam.
My E-mail appears as spam |
Troubleshooting – Mail server | Part
13#17
What is the meaning of: “our mail
server”?, Mail server IP, host name
and Exchange Online. One of our
users got an NDR which informs him,
that his mail server is blacklisted!,
How do we know that my mail server
is blacklisted?
My E-mail appears as spam |
Troubleshooting – Mail server | Part
14#17
The troubleshooting path logic. Get
the information from the E-mail
message that was identified as
spamNDR. Forwarding a copy of the
NDR message or the message that
saved to the junk mail
My E-mail appears as spam |
Troubleshooting – Mail server | Part
15#17
Step B – Get information about your
Exchange Online infrastructure, Step
C – fetch the information about the
Exchange Online IP address, Step D –
verify if the “formal “Exchange Online
IP address a
Page 21 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17
Written by Eyal Doron | o365info.com
De-list your organization from a
blacklist | My E-mail appears as spam
| Part 16#17
Review the charters of a scenario in
which your organization appears as
blacklisted. The steps and the
operations that need to be
implemented for de-list your
organization from a blacklist.
Summery and recap of the troubleshooting and best practices in a
scenario of internal  outbound spam
Dealing and avoiding internal spam |
Best practices | Part 17#17
Provide a short checklist for all the
steps and the operation that relates
to a scenario of – internal  outbound
spam.

Weitere ähnliche Inhalte

Andere mochten auch

Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Autodiscover flow in active directory based environment part 15#36
Autodiscover flow in active directory based environment  part 15#36Autodiscover flow in active directory based environment  part 15#36
Autodiscover flow in active directory based environment part 15#36Eyal Doron
 
IND-2012-252 A G Matic Hr sec School -Kids Birthday Garden
IND-2012-252 A G Matic Hr sec School -Kids Birthday GardenIND-2012-252 A G Matic Hr sec School -Kids Birthday Garden
IND-2012-252 A G Matic Hr sec School -Kids Birthday Gardendesignforchangechallenge
 
Be past sp
Be past spBe past sp
Be past spYuum67
 
PATHS Content processing 1st prototype
PATHS  Content processing 1st prototypePATHS  Content processing 1st prototype
PATHS Content processing 1st prototypepathsproject
 
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...mediamera
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...Eyal Doron
 
Exchange cas server providing exchange clients access to their mailbox part...
Exchange cas server  providing exchange clients access to their mailbox  part...Exchange cas server  providing exchange clients access to their mailbox  part...
Exchange cas server providing exchange clients access to their mailbox part...Eyal Doron
 
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...pathsproject
 

Andere mochten auch (13)

Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Autodiscover flow in active directory based environment part 15#36
Autodiscover flow in active directory based environment  part 15#36Autodiscover flow in active directory based environment  part 15#36
Autodiscover flow in active directory based environment part 15#36
 
IND-2012-290 Anando -REUNION
IND-2012-290 Anando -REUNIONIND-2012-290 Anando -REUNION
IND-2012-290 Anando -REUNION
 
第10回word bench熊本
第10回word bench熊本第10回word bench熊本
第10回word bench熊本
 
IND-2012-289 Anando SIGNATURE CAMPAIGN
IND-2012-289 Anando SIGNATURE CAMPAIGNIND-2012-289 Anando SIGNATURE CAMPAIGN
IND-2012-289 Anando SIGNATURE CAMPAIGN
 
Renaissance
RenaissanceRenaissance
Renaissance
 
IND-2012-252 A G Matic Hr sec School -Kids Birthday Garden
IND-2012-252 A G Matic Hr sec School -Kids Birthday GardenIND-2012-252 A G Matic Hr sec School -Kids Birthday Garden
IND-2012-252 A G Matic Hr sec School -Kids Birthday Garden
 
Be past sp
Be past spBe past sp
Be past sp
 
PATHS Content processing 1st prototype
PATHS  Content processing 1st prototypePATHS  Content processing 1st prototype
PATHS Content processing 1st prototype
 
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...
Величко М.В. (2012) — Территориальные инновации, их внедрение и кадровое обе...
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
 
Exchange cas server providing exchange clients access to their mailbox part...
Exchange cas server  providing exchange clients access to their mailbox  part...Exchange cas server  providing exchange clients access to their mailbox  part...
Exchange cas server providing exchange clients access to their mailbox part...
 
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
 

Mehr von Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...Eyal Doron
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 

Mehr von Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17

  • 1. Page 1 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com MY E-MAIL APPEARS AS SPAM | TROUBLESHOOTING – MAIL SERVER | PART 14#17 In the current article and the next article: My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17, we will review the troubleshooting process of the scenario – “our mail server appears as blacklisted” in Office 365 and Exchange Online environment Another variation of this scenario could be: a scenario, in which we want to understand, if the problem in which our organization E-mail is identified as spamjunk mail relates to our mail server or to other possible issues.
  • 2. Page 2 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com The troubleshooting path logic Versus a scenario in which we use on-Premises mail infrastructure, in case that our mail infrastructure is hosted at Office 365 (Exchange Online), the troubleshooting logic and steps that we will need to implement are different. The “major component” in our troubleshooting path, includes the following parts: 1. Get information from the E-mail message The basis for our scenario is the information that appears in the E-mail message. The “E-mail message” could be:
  • 3. Page 3 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com  An NDR message that was sent to one of our organization users, which inform him that “his mail server” (our organization Exchange Online server) is blacklisted.  A scenario, in which external recipient reports that – our E-mail saved in his junk mail folder, and he sends us the E-mail message header which include our mail server IP address. To be able to start the troubleshooting process, we will need to “extract” the IP address that appear in the NDR message (the IP address of the Exchange Online server who appears as blacklisted). 2. Get information about your Exchange Online infrastructure In an Exchange Online environment, we will need to get information about the Exchange Online that represent our domain: the Exchange Online hostname + IP address that is “mapped” to our Exchange Online hostname. 3. Fetch the information about the Exchange Online IP address We will need to get the IP address of the “Office 365 mail server” that sent out the E-mail message “on behalf” of the Office 365 users to the destination recipient. 4. Verify if the “formal “Exchange Online IP address appear as blacklisted. This is the “cross-section” part, in which we want to verify if the IP address that appear in the NDR message is related to our
  • 4. Page 4 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com “formal Exchange Online server” or, to anther passable scenario – Exchange Online- High Risk Delivery Pool. Infer the necessary conclusions – based on the information from the former step, we can decide what are the “operations” that we will need to implement. Get the information from the E-mail message that was identified as spamNDR In the following phase, we will need to “fetch” from the E-mail message the required information about the mail server host name or the IP address that was blacklisted. We will need to ask our organization user who gets the NDR message or the external recipient who informs us that our E- mail saved in his junk mail folder, to send us a copy of the E- mail message.
  • 5. Page 5 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com Forwarding a copy of the NDR message or the message that saved to the junk mail folder. In a scenario in which we need to examine E-mail messages, the best practice is to ask for a copy of the original E-mail message. The way for providing a “complete copy” of the E-mail message is by forwarding a copy of the E-mail message. Outlook and OWA mail client include the option of “forwarding an E-mail message copy” but, not all the mail client support this option. For example: as far as I know, there is no option to send a copy of the original E-mail message when using the Gmail mail client (the option of “forwarding” E-mail doesn’t send the
  • 6. Page 6 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com “complete E-mail message that included the original mail headers). In the following section, we will demonstrate how to forward or copy of the “original E-mail message” by using Outlook and OWA mail client. 1. Sending E-mail as attachment using Outlook Outlook mail client includes the option that describes as forward E-mail as an attachment. 1. Select the E-mail item 2. In the HOME menu, click on the more option and then click on the forward as attachment In the following screenshot, we can see the result – the E-mail that was sent includes a copy of the original E-mail message. Later, we can access the “original E-mail message” and analyses the information that’s included in the E-mail message header.
  • 7. Page 7 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 2. Sending (forwarding) E-mail as attachment using OWA 1. Log into Office Web App (OWA). 2. Click on the option New. 3. Click the open separate window icon, located at the top right corner of the message window. This will open this message as its own window within your browser.
  • 8. Page 8 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 4. Locate the “new E-mail window” side by side with the OWA window. 5. Drag and drop the email from your mail folder in the window of the new E-mail message In the following screenshot, we can see the E-mail message appears as an attachment in the “new E-mail message” Getting the required information from the E- mail header In a scenario in which we need to “extract” the Exchange Online server IP address from an E-mail message that was sent to an external receipt, we will need to access the information is “hidden”, in the E-mail message part named: mail header.
  • 9. Page 9 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com Getting the E-mail header when using Outlook mail client 1. Choose the specific E-mail message 2. Chose the File
  • 10. Page 10 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 3. In the window that appears, click on the Properties 4. In the section named: Internet headers, you can see the content of the mail header.
  • 11. Page 11 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 5. Copy the information from the window and send the information for further analysis. Getting the E-mail header when using OWA mail client 1. Choose the specific E-mail message 2. Choose the “more option” icon (the three dots)
  • 12. Page 12 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 3. Choose the option: View message details 4. In the pop out windows that appear, we can see the content of the mail header.
  • 13. Page 13 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 5. Copy the information from the window and send the information for further analysis. Getting the E-mail header when using Gmail mail client The Gmail E-mail web client, doesn’t include an option for forwarding E-mail message as an attachment. The only option that we can use is asking for the user to send us a copy of the E-mail header (the E-mail message that was saved in his junk mail folder). To be able to view the E-mail header when using Gmail mail client, use the following procedure: 1. Open the message in your Gmail inbox.
  • 14. Page 14 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 2. Click the down-arrow in the top-right corner of the message. 3. Click the “Show original” link toward the bottom of the option’s box. The message will open in a separate window with the full message headers at the top. 4. In the windows that appear, we can see the content of the mail header.
  • 15. Page 15 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 5. Copy the information from the window and send the information for further analysis. Additional reading  How to view the full message headers of an email Internal outbound spam in Office 365 environment | Article series index A quick reference for the article series
  • 16. Page 16 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com My E-mail appears as a spam | Article series index | Part 0#17 The article index of the complete article series Introduction to the concept of internal outbound spam in general and in Office 365 and Exchange Online environment My E-mail appears as a spam – Introduction | Office 365 | Part 1#17 The psychological profile of the phenomenon: “My E-mail appears as a spam!”, possible factors for causing our E-mail to appear a “spam mail”, the definition of internal outbound spam. Internal spam in Office 365 – Introduction | Part 2#17 Review in general the term: “internal outbound spam”, miss conceptions that relate to this term, the risks that are involved in this scenario, outbound spam E-mail policy and more. Internal spam in Office 365 – Introduction | Part 3#17 What are the possible reasons that could cause to our mail to appear as spamjunk mail, who or what are this “elements”, that can decide that our
  • 17. Page 17 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com mail is a spam mail?, what are the possible “reactions” of the destination mail infrastructure that identify our E- mail as spamjunk mail?. Commercial E-mail – Using the right tools | Office 365 | Part 4#17 What is commercial E-mail? Commercial E-mail as part of the business process. Why do I think that Office 365 Exchange Online is unsuitable for the purpose of commercial E-mail? Introduction if the major causes for a scenario in which your organization E-mail appears as spam My E-mail appears as spam | The 7 major reasons | Part 5#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail: 1. E-mail content, 2. Violation of the SMTP standards, 3. BulkMass mail My E-mail appears as spam | The 7 major reasons | Part 6#17 Review three major reasons, that could lead to a scenario, in which E- mail that is sent from our organization identified as spam mail:
  • 18. Page 18 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com 4. False positive, 5. User Desktop malware, 6. “Problematic” Website Introduction if the subject of SPF record in general and in Office 365 environment What is SPF record good for? | Part 7#17 The purpose of the SPF record and the relation to for our mail infrastructure. How does the SPF record enable us to prevent a scenario in which hostile elements could send E-mail on our behalf. Implementing SPF record | Part 8#17 The “technical side” of the SPF record: the structure of SPF record, the way that we create SPF record, what is the required syntax for the SPF record in an Office 365 environment + mix mail environment, how to verify the existence of SPF record and so on. Introduction if the subject of Exchange Online - High Risk Delivery Pool High Risk Delivery Pool and Exchange Online | Part 9#17 How Office 365 (Exchange Online) is handling a scenario of internal outbound spam by using the help of
  • 19. Page 19 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com the Exchange Online- High Risk Delivery Pool. High Risk Delivery Pool and Exchange Online | Part 10#17 The second article about the subject of Exchange Online- High Risk Delivery Pool. The troubleshooting path of internal outbound spam scenario My E-mail appears as spam – Troubleshooting path | Part 11#17 Troubleshooting scenario of internal outbound spam in Office 365 and Exchange Online environment. Verifying if our domain name is blacklisted, verifying if the problem is related to E-mail content, verifying if the problem is related to specific organization user E-mail address, moving the troubleshooting process to the “other side. My E-mail appears as spam | Troubleshooting – Domain name and E-mail content | Part 12#17 Verify if our domain name appears as blacklisted, verify if the problem relates to a specific E-mail message content, registering blacklist monitoring services, activating the
  • 20. Page 20 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com option of Exchange Online outbound spam. My E-mail appears as spam | Troubleshooting – Mail server | Part 13#17 What is the meaning of: “our mail server”?, Mail server IP, host name and Exchange Online. One of our users got an NDR which informs him, that his mail server is blacklisted!, How do we know that my mail server is blacklisted? My E-mail appears as spam | Troubleshooting – Mail server | Part 14#17 The troubleshooting path logic. Get the information from the E-mail message that was identified as spamNDR. Forwarding a copy of the NDR message or the message that saved to the junk mail My E-mail appears as spam | Troubleshooting – Mail server | Part 15#17 Step B – Get information about your Exchange Online infrastructure, Step C – fetch the information about the Exchange Online IP address, Step D – verify if the “formal “Exchange Online IP address a
  • 21. Page 21 of 21 | My E-mail appears as spam | Troubleshooting - Mail server | Part 14#17 Written by Eyal Doron | o365info.com De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17 Review the charters of a scenario in which your organization appears as blacklisted. The steps and the operations that need to be implemented for de-list your organization from a blacklist. Summery and recap of the troubleshooting and best practices in a scenario of internal outbound spam Dealing and avoiding internal spam | Best practices | Part 17#17 Provide a short checklist for all the steps and the operation that relates to a scenario of – internal outbound spam.