Emails and anti-spam Page 1



Similar documents
USER GUIDE. Mailjet in webcrm

Marketing Glossary of Terms

Blackbaud Communication Services Overview of Delivery and FAQs

Instructions Microsoft Outlook Express Page 1

Instructions Android Smartphone & Tablet Page 1

XGENPLUS SECURITY FEATURES...

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Cloud Services. Anti-Spam. Admin Guide

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

Guardian Digital Secure Mail Suite Quick Start Guide

Service Launch Guide (US Customer) SEG Filtering

How To Prevent Spam From Being Filtered Out Of Your Program

Enterprise Marketing: The 8 Essential Success Factors

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

How To Block Ndr Spam

Top 40 Marketing Terms You Should Know

A White Paper. VerticalResponse, Delivery and You A Handy Guide. VerticalResponse,Inc nd Street, Suite 700 San Francisco, CA 94107

Services Deployment. Administrator Guide

Articles Fighting SPAM in Lotus Domino

You ve got. Best practices for deliverability. Microsoft Dynamics Marketing

Anti-SPAM Policy v

Frequently Asked Questions

WHAT IS DOUBLE OPT-IN VERIFICATION?

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

Configuring Security for SMTP Traffic

Spam DNA Filtering System

Top 25 Marketing Terms You Should Know. Marketing from Constant Contact

SIMPLE STEPS TO AVOID SPAM FILTERS DELIVERABILITY SUCCESS GUIDE

Installation Guide For Choic Enterprise Edition

Anchor s Marketing Glossary and Common Terms

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

MDaemon configuration recommendations for dealing with spam related issues

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Antispam Security Best Practices

The Essential Marketing Glossary

About the Junk Filter

The DMA s Analysis of Can Spam Act of 2003

Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) x125

SPAM UNDERSTANDING & AVOIDING

Spam Act 2003: A practical guide for business

How To Stop Spam From Being A Problem

SMTP Settings. Magento Extension User Guide. Official extension page: SMTP Settings. User Guide: SMTP Settings

How to change your Internet Service Provider

Setting up Microsoft Office 365

Deliverability Counts

Migration Project Plan for Cisco Cloud Security

Symantec Hosted Mail Security Getting Started Guide

SPAM FILTER Service Data Sheet

Setting up Microsoft Office 365

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

An Overview of Spam Blocking Techniques

FireEye Threat Prevention Cloud Evaluation

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Marketing. Send beautiful campaigns, track the results and manage your subscribers. For further information, call or

Mailrelay The best marketing solution for your needs

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

How To Set Up Comendo.Comendo.Org For A Spammer To Send To Your Domain Name From Your Domain From Yourdomain.Com Or Yourdomain From Yourmail.Com To Yourdomain (For A Domain Name)

Comprehensive Filtering. Whitepaper

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Microsoft Outlook 2010 contains a Junk Filter designed to reduce unwanted messages in your

BULK MAIL CAMPAIGN RULES

SMTPSWITCH MAILER V6 FEATURES

10 Ways to Improve B2B Deliverability:

Basic Funneling MX Verify and Redundancy. Why Sorting Solutions? Why Vircom?

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

PARTNER GUIDELINES

Tutorial Details Product Demonstrated: X-301 Estimated Completion Time: 15 minutes

Fighting spam in Australia. A consumer guide

Deploying Layered Security. What is Layered Security?

ContentCatcher. Voyant Strategies. Best Practice for Gateway Security and Enterprise-class Spam Filtering

ANTI-SPAM POLICY JANUARY 2014

How to Engage Your Contacts Using Marketing

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the beast. Microsoft's online safety strategy

How To Protect Your From Spam On A Barracuda Spam And Virus Firewall

Security. Help Documentation

Smart E-Marketer s Guide

Good Practice use of Outlook, Thunderbird and HORDE Webmail

Best Practice Standards for Marketing

Spam: What Consumers Really Think

FKCC AUP/LOCAL AUTHORITY

Transcription:

Emails and anti-spam Page 1

As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails with your own email address inserted as the sender of the email. Many anti-spam engines mark such emails as a potential spam risk because the server sending the email is not the server normally used for sending your emails. 1. You send an email from your webcrm system 2. The email arrives at the receivers email server 3. The receiver s email server asks your email server if webcrm may send emails on your behalf 4. If this is not the case, then the email may be considered as spam Receiver s email server Your email server Receiver In your own interest webcrm enforce a policy to reduce the risk of your emails being considered as spam. It is important that your own email server will permit webcrm servers to send emails on your behalf. To do this you need to define a so-called SPF record. This normally requires that you have your own email domain. If your email is for example an @hotmail email address you should not send emails from webcrm. To publish that you permit sending your emails from the webcrm email domain you need to have your Internet Service Provide create or modify the SPF record to include records from: spf.webcrm.com Please refer to page 4 for technical details. Page 2

As an alternative to SPF records you may be able to permit your own email server to relay the email messages sent from webcrm. If your security policies will permit relay then the webcrm servers can send the emails to your own email server, and then your own email server will send the emails on to the final receivers. It is recommended that you still create a SPF record for your own email server. In order to relay you must have an IT professional capable of configuring/enabling the relay in your firewall / email server. We cannot assist you directly with this task. You must enable/permit webcrm to SMTP relay from the IP range: 194.150.113.1-194.150.113.99. webcrm must be informed of the email domain and the port to relay by. And also if you want to apply encryption (TLS). Receiver s email server Your email server Receiver Page 3

SPF records a technical note Sender Policy Framework (SPF) is an email validation system designed to prevent email spam by detecting email spoofing, a common vulnerability, by verifying sender IP addresses. SPF allows administrators to specify which hosts are allowed to send mail from a given domain by creating a specific SPF record (or TXT record) in the Domain Name System (DNS). Mail exchangers use the DNS to check that mail from a given domain is being sent by a host sanctioned by that domain's administrators. Sender Policy Framework is defined in IETF publication RFC 4408. To publish that you permit sending your emails from the webcrm email domain you need to have your Internet Service Provide create or modify the SPF record to include records from: spf.webcrm.com SPF record formats do vary and you should consult your IT staff or Internet Service Provider for the exact format to use. Example text for SPF record permitting webcrm SMTP server as well as your own email server: "v=spf1 ip4: 111.222.333.444 a mx include:spf.yourdomain.com include:spf.webcrm.com?all" "v=spf1 include:spf.webcrm.com ip4:111.222.333.444 -all" Where 111.222.333.444 is the IP for your own smtp server and your domain is yourdomain.com Page 4

What else can you do? Even if you have a correct SPF record your emails may still be considered as spam depending on the content of the email. General Guidelines To Avoid Emails To Be Mistaken For Spam If you run a mailing list, or email newsletter that sends out numerous similar or identical messages, you may risk being accused of sending spam. If you are accused of spamming, your ISP may cancel your account, you may lose the hosting of your website. If possible, limit each email shot to 1000 emails. If your emails are being sent to people who did not sign up to receive them, or to people who may have signed up and forgotten, you may begin receiving spam complaints. If these complaints make it to your Internet Service Provider, some of the consequences mentioned above may result. If unwilling receivers of your email report it to an internet blacklist, you may have your site may blacklisted by thousands of other internet servers. If you add people to your list without their consent, you will often be labelled as a spammer. Spam doesn't necessarily have to be for bogus products and services. Your legitimate email newsletter may be considered spam simply because it was unsolicited. If your emails are all identical, with no personalized information whatsoever, these may be considered spam as well. Since spam is mass-emailed to tens of thousands of individuals, its content is usually completely general. If your correspondence contains no personalized or unique information, or appears to be "canned" it may be mistaken for spam. If you send emails to people on your mailing list that contain topics or information that are irrelevant to the original description of your mailing list, you may be considered a spammer. People who signed up for your list did so in order to receive pertinent information, if you wish to send them email on unrelated topics, you should ask their permission first. Also, if you send correspondence to people at a more frequent rate than you had specified when they signed up, this may be considered spamming as well. Page 5

What Not To Do: Email text with more than 76 characters per line. Emails with text lines exceeding 76 characters in one line are likely to be considered as spam. Do not purchase email lists or so-called opt-in lists from companies claiming to have "thousands of legitimate email addresses". Most of these companies do not bother to check whether the addresses on their lists are valid and hardly ever ask for consent from their recipients. You will end up sending your mail to unwilling recipients and will be accused of spamming. Do not send unsolicited emails with an "opt-out" option and expect this to legitimize your email. Users should not have to go through the trouble of opting out of a mailing list that they did not sign up for in the first place. Many internet users will also ignore the "opt-out" instructions because spammers use these to validate the email addresses in their lists. Do not request a receipt of delivery for your mailing list. Many users consider this an invasion of privacy, and spammers also use this ploy for email verification. Do not use any spamming or harvesting software. This includes automated email programs, email address guessing and verification programs, webpage spiders, Usenet harvesters, or any other unsolicited email software. The use of these devices is universally attributed to spammers. Do not send numerous identical messages. If you are sending out multiple emails, attempt to personalize the subject and body of the messages so they are not completely general. Messages that appear "canned" are often considered spam. What you Should Do: Always DOUBLE VERIFY every email address in your list. This means that upon receiving an email address from an online form, or by any other means, you should send a brief confirmation email stating that their email address was submitted, and asking them to confirm their registration in your mailing list. Keep track of where you receive every email address on your list. This way, if there is ever a dispute or complaint, you can provide your members with a complete history of their subscription. When you keep track of where each email address came from, you can identify where the "dirty" source was, and cease to use it. Keep your mailing list up to date. Make requested contact changes promptly, and do requested removals immediately. Personalize the subject and body of your emails. Although this may take more time, it adds a level of credibility and professionalism that will set you apart from spammers. State your terms clearly and stick to them. If you are going to send out an email every week, make sure that your recipients are aware of this, and do not send out any more than that. If you are going to be sending email about one specific topic, stick to this topic and do not send out unrelated material without prior permission. Page 6