SMTP Relay set up. Technical team

Size: px
Start display at page:

Download "SMTP Relay set up. Technical team"

Transcription

1 Technical team 09/08/2016

2 Summary Introduction... 3 SMTP Relay service description... 3 Presentation of our service... 4 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending authentication... 5 Tracking... 6 Details on returned information... 6 Datas feeds... 7 Customer data feeds... 7 Send set-up... 8 Message header... 8 MX records set-up... 9 SPF/DKIM set-up... 9 Usage... 9 Identification and authentication... 9 Qualification... 9 Integrity... 9 Used standard policies... 9 SPF (Sender Policy Framework)... 9 Sender ID DKIM (DomainKeys Identified Mail) DNS set-up Case 1: Customer ensures the domains management Case 2: Customer delegates sub-domain management to SPLIO Case 3: SPLIO manages your DNS Google postmaster management

3 Introduction SMTP Relay service description This document intends to provide technical information on SMTP Relay (Forward formerly) service, in order to facilitate the set up and launch. Some functional aspects are mentioned for a better understanding of the flow. smtp RELAY++ 3

4 Presentation of our service Services covered The SMTP Relay service is dedicated to outsource the delivery optimization, and returning the hard-bounces in synchronous mode, and also, as optional features, tracking and reporting in asynchronous mode. The SMTP Relay service cannot remove the sender responsibilities regarding the privacy policies and local laws. SMTP Relay can manage delegated functionalities such as: SMTP transaction procedures Spam complaints management Hard-bounces management Unsubscriptions through feed-back loops (FBL type list-unsubscribe) Immediate blacklist preventing recipient to receive a Newsletter after unsubscription Campaign events (Hard-bounces, Unsub, clicks,..) can be delivered» Through an asynchronous mode (flat file through FTP or FTP TLS)» Through a synchronous mode (SMTP or HTTP requests) (optional) Authentications» Messages can be signed with DomainKey/DKIM» SPF/Sender ID management» Sub-domain delegation (optional) Additional services :» IP reputation Monitoring ReturnPath SenderScore Certification (optional) Easy and intuitive monitoring and reporting tools Advanced reporting facilities (optional) The set-up is designed to be quick. 4

5 Service set-up Infrastructure Set-up Customer sending authentication Option 1: The SPLIO customer is identified by a set of IP addresses. host : forward-in.splio.fr Protocol : SMTP Port: 25 (or 587) Note: If your network configuration does not allow port 25 nor port 487, please use 2525 if you are confronted to this case. 5

6 Option 2: The SPLIO customer is identified by username/password, the authorization protocol is AUTH LOGIN host : forward-auth.splio.fr Protocol : SMTP over SSL Port: 465 username : created on request to your contact at SPLIO password : created on request to your contact at SPLIO Notes: This mechanism is recommended when the IPs of your servers are subject to change, like it might be the case for Cloud. Google Cloud is not allowing port 465 to be used, please use if you are confronted to this case. Once the credentials are communicated to the customer, the service is open only between customer and SPLIO, but the first messages are not relayed until further checks done by SPLIO. The first messages are blocked until checks are ok. Then SPLIO notifies the customer of the real availability of the service. Tracking Details on returned information Returned information can be set from basic to advanced, depending on customer requirements:» No tracking In such case, the MIME content is not modified by SPLIO's scripts» Opening rate A web bug is added to the HTML message to monitor the opening rate. The basic set up doesn't capture personal details on openers.» Openers 6

7 Through optional set up, Openers details can be captured and reported. ( address / IDuser).» Clickers rate Through optional set up, Clickers rate can be monitored (aggregated to the contact, with no link details)» Advanced tracking and reporting Trough optional set up, advanced monitoring on behavior can be captured and reported (with personal details and links used)» DualTrack As additional feature, our DualTrack can replay through an asynchronous mode the campaign activity captured in real time by SPLIO. DualTrack requires advanced tracking. This functionality requires a prior technical analysis and validation by SPLIO consultants. The tracking URL can be in https or http depending on the type or tracking. Datas feeds Customer data feeds As mentioned previously, the data captured by SPLIO tools can be delivered through various options:» Flat files (through FTP) A file can be periodically delivered (by default, on a daily basis) this frequency can be increased or decreased. The file is available on FTP (secured FTP TLS is also available). The flat file structure must be agreed between customer and SPLIO. Usual informations are: Soft bounces Hard bounces Unsubscribes (through List-Unsubscribe) Spam complaints Usual identifiers are: CampaignID or Campaign caption RecipientID or address 7

8 Action (hard/soft/spam/open/click/unsub) Data (/ IP address/used link/..) Default format is as below (separator is tab): Recipientid campaignid ext chanel from status campaign normal done campaign normal hard campaign normal soft campaign vip done Send set-up Message header The SPLIO relay behavior and reports can be adjusted through some additional tags within the messages header. The naming convention for the tags to be monitored by SPLIO tools is to begin with: x-splio- 3 tags to allow post-campaign reports split: x-splio-ref : campaign identifier x-splio-extid : recipient id x-splio-canal : channel x-splio-filteroff: Y/N : Optional disabling of the SPLIO blacklist. This option is dedicated to transactional messages such as ecommerce order confirmation, logistic information, etc.. It is not supposed to be used with a marketing campaign. Using this option implies a strong integration of Unsubscriptions and spam complaint management at the customer side. *Requires activation on SPLIO s side. Based on the presence of these tags and agreed values, the behavior of our SMTP relay can be adjusted (priority/rate/dedicated IP/header recording/tracking/billing ref/reporting aggregates/mime changes/ sender) or be retrieved while producing the data feed to the customer. 8

9 MX records set-up The MX record can be updated to set mail exchanger= mail.splio.fr, depending on customer case. SPF/DKIM set-up Usage Depending of ISP internal policies, the SPF, SenderID and DKIM can be optional or mandatory to ensure the deliverability of s. SPLIO strongly recommends implementing the DKIM and SPF/SenderID so that the deliverability will be secured. Identification and authentication Identification is the sender value such as The authentication stage checks that the sender name used is corresponding to the declared information accessible from a reverse lookup. Qualification Qualification assessment intends to verify the sender is accredited to send a mail. This stage comes after authentication. Integrity This last stage occurs to check the message has been routed directly with alteration. Used standard policies SPF (Sender Policy Framework) SPF is the standard policy to which SPLIO complies. The SPF record information allows declaring regular IP addresses to be accepted to send s and recognized at the "MAIL FROM:" assessment (during the transaction SMTP hand check). 9

10 Trying Connected to mx1.mail.eu.yahoo.com. Escape character is '^]'. 220 mta1043.mail.ird.yahoo.com ESMTP YSmtp service ready EHLO mail.splio.fr 250-mta1043.mail.ird.yahoo.com 250-8BITMIME 250-SIZE PIPELINING MAIL FROM: 250 sender ok Table 1 - Transaction SMTP initial hand check mydomain.com 3600 IN TXT "v=spf1 ip4: /21 ~all" mydomain.com 3600 IN SPF "v=spf1 ip4: /21 ~all" Table 2 - SPF/TXT record splio.fr for a dedicated setting Table 2 returns the following credentials: Any server with an IP belonging to the range /21 is allowed to use the domain splio.fr in the MAIL FROM: section Using a range of IPs exposes to potential change in the future. As a consequence, SPLIO is requesting to use "v=spf1 include:spf.splio.com mx a ~all" instead. The all or ~all are discussed at a later stage. Any other server is not allowed to use the domain splio.fr in the MAIL FROM: section Further information on SPF options is available on the public domain. The ISPs use SPF records to define if a message should be rejected; not setting SPF would be considered as a bad behavior. A SPF record properly set will foster the successful message delivery. Advantages SPF check-in allows rejecting from the very first step of the process Inconveniences Some ISP may accept s even if the sender IP address is not compliant. 10

11 Sender ID Sender ID is a Microsoft specific policy, it derivates from SPF. As the behavior is quite different, SPLIO recommends complying with Microsoft policy. mydomain.com 600 IN TXT "spf2.0/pra include:spf2.splio.com ~all" Table 3 - Sender ID set up for mydomain.com Sender ID checks occur at "MAIL FROM:" assessment, similarly to SPF, but also evaluated later on the process on other fields like From:, the Sender:, etc. based on Purported Responsible Address (PRA) algorithm. Sender ID was required for Hotmail recipients, and is now obsolete, but Exchange mail servers may still require the SenderID. As a consequence, SPLIO is requesting to create the corresponding DNS records. Advantages It allows the router to use Sender as an alternate trusted identifier. Inconveniences If the MAIL FROM: check in allows the ISP to notify the rejection from the very first step of the SMTP transaction, the deny based on SenderID is notified later in the process. DKIM (DomainKeys Identified Mail) DKIM allows a technical signature within the messages, independent from the Sender, From, Return-Path domain values. The Sender delivers the message with a private encrypted key, The ISP receiver server controls with the public key, published at the DNS record and certifies the authentication of the sender. The regular entry into the DNS should be splio._domainkey.mydomain.com IN TXT "k=rsa; p= MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDFG63OUQU+COcURv/5/rD5MLkAh 3mS8c2JqskStBgMJiPTfQaxIc+qqtZAVkiud4jO5SQ5plnvRYtMnfSe+VoyGiz1j/3x5i4PUjiFKL KiGnTpvW7LcrpWwVgeRnUAqeIvACnlTc9uXv30moMvPNq4qPe1bD05oDvpxJHa12lqlwIDA QAB" In order to simplify the DNS entry, SPLIO is recommending to use CNAME instead of the full declarative key: splio._domainkey.mydomain.com. CNAME splio.dkim.splio.com. 11

12 Table 4 - Display of public key for DKIM signature on mydomain.com DKIM is used to establish trust between recognized sender and receiver and can shunt further filtering procedures doing so, the workload is lighter and the delivery of messages is simplified The DKIM signature is strongly recommended by Yahoo! to allow the FeedBack Loop to work. Gmail is requesting this signature. Hotmail usage of DKIM is less important. Advantages It allows consolidating the sender reputation on one domain whatever the sender (From) uses. Inconveniences Encrypted key analysis requires more calculation resources. DNS set-up In order to ensure the authentication phases success, SPF, Sender ID and DKIM require from customer domain administrator actions on TXT records within the impacted DNS. Action can be either an insert or a change, depending if the records already exist. Warning: a new MX record might be also added, beside the SPF/SENDER ID/DKIM actions described below, depending if the subdomain dedicated to the s routed by SPLIO SMTP Relay is already existing or not, and well configured for abuse@ address. Case 1: Customer ensures the domains management SPF» Add «include:spf.splio.com» to the existing records or create them if missing. 12

13 Note: TTL value is to be set by yourself, depending on your requirements (3600 in the example below) Example: mydomain.com 3600 IN TXT "v=spf1 include:spf.splio.com mx a ~all" The example above means SPLIO is the dedicated router. So, for combination of several routers, please insert the include into the existing string mydomain.com TXT "v=spf1 ip4:xxx.xx.xxx.x/xx ip4:xxx.x.xxx.x/xx include:spf.splio.com include:spf.myotherrouter.com a mx ~all" Sender ID => Add «include:spf2.splio.com» to the existing records or create them if missing. Note: TTL value is to be set by yourself, depending on your requirements (3600 in the example below) Example: mydomain.com 3600 IN TXT "spf2.0/pra include:spf2.splio.com ~all" The example above means SPLIO is the dedicated router. So, for combination of several routers, please insert the include into the existing string mydomain.com TXT "spf2.0/pra include:spf2.splio.com include:sp2.myotherrouter.com a mx ~all" DKIM Add to your public keys, associated to your domain, a reference to our zone «splio._domainkey» with the following values: splio._domainkey.your.domain.tld. CNAME splio.dkim.splio.com. Example: splio._domainkey.mydomain.com. CNAME splio.dkim.splio.com. Notes: The underscore character used by SPLIO may be an issue depending on your domain service provider. If you already have a DKIM private key in use, please communicate this to us. 13

14 After all changes, the new DNS setting should be like this mydomain.com. TXT "v=spf1 include:spf.splio.com a mx ~all " mydomain.com. TXT "spf2.0/pra include:spf2.splio.com a mx ~all " splio._domainkey.mydomain.com. CNAME splio.dkim.splio.com. Notes: the ~all may be replaced by -all to inform the Internet Service Providers (ISPs) that no other sender than the declared ones into the DNS should be accepted for the given domain. Case 2: Customer delegates sub-domain management to SPLIO This option is billable, check this with your SPLIO sales contact. The DNS admin of your domains needs to set these additional values: IN NS ns1.splio.fr. IN NS ns2.splio.fr. IN NS ns3.splio.fr. SPLIO can then do the additional set up on its side. Case 3: SPLIO manages your DNS This option is billable, check this with your SPLIO sales contact. Google postmaster management Google is providing a tools suite in order to monitor the reputation of your domain, for the Gmail recipients. You may consider allowing SPLIO to monitor your domain reputation associated to SPLIO IPs. In such case, please liaise with your contact at SPLIO so that the access will be created. SPLIO is expected from you to add a TXT record with a key value provided by Google Postmater suite. Example: google-site-verification=v7wf1ynt5vch7z9thriuekgl7_zpclne_pvtyrspf8i 14

15 SPLIO, French independent group created in 2001, is software provider of Customer Experience Management in Saas mode and specialized in the retail industry. SPLIO, whose R&D is located in France, has a presence in three continents with offices in Paris, Barcelona, Warsaw, Beijing, Shanghai and Sao Paulo. SPLIO offers solutions that can easily be integrated and have the ability to meet the creative needs of marketers. 103 boulevard Haussmann Paris Tel. : +33 (0)

Forward set up. Technical team

Forward set up. Technical team Forward set up Technical team 09/04/2015 Summary Introduction... 3 Forward service description... 3 Presentation of our service... 3 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending

More information

Report API v1.0 Splio Customer Platform

Report API v1.0 Splio Customer Platform Report API v1.0 Splio Customer Platform 2018-06-25 SPLIO Customer Platform - REPORT API 1.0 - EN - 2018-06-25 - v1.docx Table of Contents Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3

More information

Trigger SMS API. API Documentation SPLIO - SPRING Contact and Campaign Trigger SMS API - EN v4.0.docx

Trigger SMS API. API Documentation SPLIO - SPRING Contact and Campaign Trigger SMS API - EN v4.0.docx API Documentation 2017-09-08 Summary Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3 Asia hosting... 3 Authentication... 3 Request format... 4 Response format... 4 Error Codes & Responses...

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

Factors that Impact Deliverability

Factors that Impact Deliverability Factors that Impact Deliverability Thank you for joining us. Audio: Select Use Mic & Speakers to use VOIP or Use Telephone to get dial in number and access code. If using VOIP, it is recommended that you

More information

Technical Brief: DYN DELIVERY

Technical Brief: DYN  DELIVERY Technical Brief: DYN EMAIL DELIVERY 603 668 4998 Technical Brief: Dyn Email Delivery Introduction Dyn s Email Delivery platform allows reputable senders to send both bulk and transactional emails to their

More information

Communicator. Branded Sending Domain July Branded Sending Domain

Communicator. Branded Sending Domain July Branded Sending Domain Branded Sending Domain Communicator Branded Sending Domain July 2017 Version 2.1 This document includes instructions on how to set up a new sender domain and ensure this is configured correctly. Contents

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

Instructions Microsoft Outlook 2010 Page 1

Instructions Microsoft Outlook 2010 Page 1 Instructions Microsoft Outlook 2010 Page 1 Instructions Microsoft Outlook 2010 This manual is written for users who already have an e-mail account configured in Outlook 2010 and will therefore only focus

More information

Instructions Microsoft Outlook 2007 Page 1

Instructions Microsoft Outlook 2007 Page 1 Instructions Microsoft Outlook 2007 Page 1 Instructions Microsoft Outlook 2007 This manual is written for users who already have an e-mail account configured in Outlook 2007 and will therefore only focus

More information

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

s and Anti-spam

s and Anti-spam E-mails and Anti-spam Standard authentication AUTH method As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send e-mails from your webcrm system, we use

More information

Instructions Microsoft Outlook 2013 Page 1

Instructions Microsoft Outlook 2013 Page 1 Instructions Microsoft Outlook 2013 Page 1 Instructions Microsoft Outlook 2013 This manual is written for users who already have an e-mail account configured in Outlook 2013 and will therefore only focus

More information

Marketing 201. March, Craig Stouffer, Pinpointe Marketing (408) x125

Marketing 201. March, Craig Stouffer, Pinpointe  Marketing (408) x125 Email Marketing 201 Tips to Increase Email Delivery (aka Why Good Email Goes Bad ) March, 2009 Craig Stouffer, Pinpointe Email Marketing cstouffer@pinpointe.com (408) 834-7577 x125 Gary Halliwell CEO,

More information

AWEBDESK MARKETER

AWEBDESK  MARKETER AWEBDESK EMAIL MARKETER Version 6.1.0 AwebDesk Softwares Feedback Loop Set-Up Guide Edition 1.0 March 2012 1 P a g e What is a feedback loop? Some ISPs offer a feedback loop service for senders. When a

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Using Trustwave SEG Cloud with Exchange Online

Using Trustwave SEG Cloud with Exchange Online .trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave

More information

Securing, Protecting, and Managing the Flow of Corporate Communications

Securing, Protecting, and Managing the Flow of Corporate Communications Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant

More information

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to

More information

Office 365: Secure configuration

Office 365: Secure  configuration Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Anti-Spoofing. Inbound SPF Settings

Anti-Spoofing. Inbound SPF Settings Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

Instructions Microsoft Outlook 2003 Page 1

Instructions Microsoft Outlook 2003 Page 1 Instructions Microsoft Outlook 2003 Page 1 Instructions Microsoft Outlook 2003 This manual is written for users who already have an e-mail account configured in Outlook 2003 and will therefore only focus

More information

Optimization of your deliverability: set up & best practices. Jonathan Wuurman, ACTITO Evangelist

Optimization of your  deliverability: set up & best practices. Jonathan Wuurman, ACTITO Evangelist Optimization of your email deliverability: set up & best practices Jonathan Wuurman, ACTITO Evangelist ACTITO Webinar Tour Replays & presentations available at www.actito.com/nl Our mission We help our

More information

Instructions Eudora OSE Page 1

Instructions Eudora OSE Page 1 Instructions Eudora OSE Page 1 Instructions Eudora OSE This manual is written for users who already have an e-mail account configured in Eudora OSE and will therefore only focus on how to change the SMTP

More information

Office 365 Standalone Security

Office 365 Standalone  Security The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

Best Practices. Kevin Chege

Best Practices. Kevin Chege Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently

More information

Pardot Setup Implementation Guide

Pardot Setup Implementation Guide Pardot Setup Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: May 31, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

SMS Relay. API Documentation SPLIO - SPRING Contact and Campaign SMS Relay API - EN v1.2.docx

SMS Relay. API Documentation SPLIO - SPRING Contact and Campaign SMS Relay API - EN v1.2.docx SMS Relay API Documentation 2017-09-07 Summary Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3 Asia hosting... 3 Authentication... 3 Single call... 4 Bulk call... 4 Transactional messages...

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

HOW-TO GUIDE. How to Optimize Your s for Deliverability

HOW-TO GUIDE. How to Optimize Your  s for Deliverability HOW-TO GUIDE How to Optimize Your Emails for Deliverability The Problem Email Reputation Your ability to market to your audience is based on sending emails from your Email Service Provider, or ESP. ESPs

More information

Teach Me How: B2B Deliverability in a B2C World

Teach Me How: B2B Deliverability in a B2C World Teach Me How: B2B Deliverability in a B2C World Chris Arrendale CEO & Principal Deliverability Strategist Inbox Pros (www.inboxpros.com) @Arrendale Agenda - Outline Delivery versus Deliverability Provisioning

More information

KantanMT.com. Security & Infra-Structure Overview

KantanMT.com. Security & Infra-Structure Overview KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name

More information

Mail Assure. User Guide - Admin, Domain and Level

Mail Assure. User Guide - Admin, Domain and  Level Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Friday, June 15, 2018 ----------- 2018 CONTENTS Getting Started 1 Useful Links 1 What's New 1 Accessing Mail Assure 6 User Permissions

More information

A Federal Agency Guide to Complying with Binding Operational Directive (BOD) 18-01

A Federal Agency Guide to Complying with Binding Operational Directive (BOD) 18-01 Table of Contents Introduction... 2 Required Actions Overview... 2 Required Actions Email Security... 3 Required Actions Web Security... 9 Status of Implementation... 11 Roles and Responsibilities... 11

More information

Deliverability 2016: It s beyond just reaching the inbox

Deliverability 2016: It s beyond just reaching the inbox Deliverability 2016: It s beyond just reaching the inbox Agenda A Decade of Deliverability Deliverability: 2006 Deliverability: 2016 The Future of Deliverability Management Innovative Preview Demonstration

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

vbulletin and VerticalResponse

vbulletin and VerticalResponse vbulletin and VerticalResponse Email Campaigns Made Easy May 16, 2011 Page 1 VerticalResponse, Inc. Introduction VerticalResponse Team Christina Hoheisel Business Development Manager christina@verticalresponse.com

More information

DNS Management with Blue Cat Networks at PSU

DNS Management with Blue Cat Networks at PSU DNS Management with Blue Cat Networks at PSU Network and System Administrators at Penn State can make their own DNS changes, live, using the Blue Cat Proteus web-based interface. Proteus will be used by

More information

Table of content. Authentication Domain Subscribers Content Sending practices Conclusion...

Table of content.  Authentication Domain Subscribers Content Sending practices Conclusion... A User Guide Before sending your carefully-crafted email campaigns, it s important to first understand a few basic ideas and rules of email marketing to ensure your campaigns are successful. To achieve

More information

Introduction to Antispam Practices

Introduction to Antispam Practices By Alina P Published: 2007-06-11 18:34 Introduction to Antispam Practices According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number

More information

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic

More information

How to Configure Esva for Office365

How to Configure Esva for Office365 How to Configure Esva for Office365 This article addresses configuring Office 365 with Libra Esva as your inbound and/or outbound mail gateway. You can specify the appliance as an inbound mail gateway

More information

========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version

========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version ========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version 9.5.1 software update notes =========================================================================

More information

Configuring Gmail (G Suite) with Cisco Cloud Security

Configuring Gmail (G Suite) with Cisco Cloud  Security Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.

More information

Comendo mail- & spamfence

Comendo mail- & spamfence Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...

More information

Digital Messaging Center Feature List

Digital Messaging Center Feature List Digital Messaging Center Feature List Connecting Brands to Consumers Teradata Overview INTEGRATED DIGITAL MESSAGING Deliver Digital Messages with Personalized Precision Teradata s Digital Messaging Center

More information

Deliverability Terms

Deliverability Terms Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help

More information

Google Calendar ID. School Calendar calendar@beautifulsaviorchurch.com This ID can be pasted into Other Calendars in the Google Calendar online to add the calendar directly into your Google Calendar. ical

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Automatic Delivery Setup Guide

Automatic  Delivery Setup Guide for GuideSpark Communicate Cloud Table of Contents Summary: Working with Automatic Email Delivery... 1 What your IT department needs to know... 2 Prerequisite: Select a Targeted Audience... 3 Enable Automatic

More information

2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8

2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8 2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG-0136-00 January 2016 Page 1 of 8 Contents Introduction... 3 Infoblox and Route 53 Synchronization... 3 Prerequisites...

More information

Authentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER

Authentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER Email Authentication GUIDE Frequently Asked QUES T ION S T OGETHER STRONGER EMAIL AUTHENTICATION Marketers that use email for communication and transactional purposes should adopt and use identification

More information

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

To create a few test accounts during the evaluation period, use the Manually Add Users steps. Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page,

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Marketing Best Practices that Maximize Deliverability

Marketing  Best Practices that Maximize Deliverability Marketing Email Best Practices that Maximize Deliverability The rules have changed for email as a marketing tools. Sophisticated email receivers like Gmail have taken engagement-based actions to new levels

More information

Guide To Navigating POPI

Guide To Navigating POPI Guide To Navigating POPI July 2014 Table of Contents Introduction 3 About this Guide 4 10 Points to Consider on the Road to POPI Compliance 5 - Specific Business Purpose or Consent 6 - Maintain the Quality

More information

SMTP Settings for Magento 2

SMTP  Settings for Magento 2 For more details see the Delete Order for Magento 2 extension page. SMTP Email Settings for Magento 2 Send only reliable emails from a popular local hosting or a custom Magento 2 SMTP server. Run tests

More information

McAfee Gateway Appliance Patch 7.5.3

McAfee  Gateway Appliance Patch 7.5.3 Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation

More information

Office 365 Inbound and Outbound SMX configuration. 4 th January 2018

Office 365 Inbound and Outbound SMX configuration. 4 th January 2018 Office 365 Inbound and Outbound SMX configuration 4 th January 2018 Legal Notice Copyright 2005-2018 SMX Limited. All rights reserved. The contents of this document constitute valuable proprietary and

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

My The guide.

My  The guide. My email The guide Read our Blog: http://.co.uk/blog View our support site: http://123-reg.co.uk/support Follow us on Twitter: https://twitter.com/123reg Contents 1. How do I get my own personalised email

More information

Building a Scalable, Service-Centric Sender Policy Framework (SPF) System

Building a Scalable, Service-Centric Sender Policy Framework (SPF) System Valimail White Paper February 2018 Building a Scalable, Service-Centric Sender Policy Framework (SPF) System Introduction Sender Policy Framework (SPF) is the protocol by which the owners of a domain can

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, on page 1 Defining Remote

More information

WHITEPAPER Rewrite Services. Power365 Integration Pro

WHITEPAPER  Rewrite Services. Power365 Integration Pro WHITEPAPER Email Rewrite Services Power365 Integration Pro Table of Contents The Challenge... 3 The Binary Tree Solution... 3 What to Expect... 3 Day 1 Email Rewrite Services... 3 Day 2 Email Rewrite Services...

More information

Domain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Domain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding  Types... Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Email Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome

More information

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:

More information

i-mscp OpenDKIM plugin

i-mscp OpenDKIM plugin 2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.

More information

Top 10 Deliverability Best Practices. #ActOnSW

Top 10 Deliverability Best Practices. #ActOnSW Top 10 Deliverability Best Practices Today s Presenter David Fowler Act-On Chief Privacy & Deliverability Officer david.fowler@act-on.net Agenda The Deliverability Ecosystem Top 10 Best Practices Common

More information

Advanced Marketing Certification Training

Advanced  Marketing Certification Training Advanced Email Marketing Certification Training Duration: 25+ hours; e-learning content PREREQUISITES Although not required, ideally, participants will first complete our Email Marketing Foundations course.

More information

Setting Up in Daycare Works Help. Version: 06/25/2013

Setting Up  in Daycare Works Help. Version: 06/25/2013 Setting Up Email in Daycare Works Help Version: 06/25/2013 Table of Contents Table of Contents 2 How to Setup a SMTP Server 3 Setting up an SMTP server allows administrators the ability to route emails

More information

Mail Reporting. User Guide - Table of Contents. Overview. Use Case(s) Accessing the Tool. Mail Reporting Tools. Sent s.

Mail Reporting. User Guide - Table of Contents. Overview. Use Case(s) Accessing the Tool. Mail Reporting Tools. Sent  s. Mail Reporting 2016 - Fall Edition User Guide - Table of Contents Overview Use Case(s) Accessing the Tool Mail Reporting Tools Sent Emails Message Details Scheduled Emails Unsubscribe Bounce Blacklist

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

DKIM Implementation How

DKIM Implementation How DKIM Implementation How Murray S. Kucherawy Principal Engineer, Cloudmark June 8, 2009 Planning Your Deployment Selecting Key Rotation Policy How long do your keys live? Similar in nature to your password

More information

G-Lock EasyMail7. Startup Guide. Client-Server Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit

G-Lock EasyMail7. Startup Guide. Client-Server  Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with

More information

Certification. Standards and Requirements. December Return Path, Inc.

Certification. Standards and Requirements. December Return Path, Inc. Certification Standards and Requirements December 2017 Return Path, Inc. Table of Contents Introduction... 4 What are the standards and requirements for becoming and staying Certified?... 4 Why do we hold

More information

Deliverability Webinar: Factors that Impact Deliverability Hosted by the emarketing Learning ebizitpa

Deliverability Webinar: Factors that Impact Deliverability Hosted by the emarketing Learning ebizitpa Email Deliverability Webinar: Factors that Impact Deliverability Hosted by the emarketing Learning Center @ ebizitpa Question and Answer Session January 29, 2009 Q: In regards to the slide entitled Step

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

DKIM Implementation. Messaging Anti-Abuse Working Group. Segment 3 of 4 on DomainKeys Identified Mail. MAAWG Training Series

DKIM Implementation. Messaging Anti-Abuse Working Group. Segment 3 of 4 on DomainKeys Identified Mail. MAAWG Training Series Messaging Anti-Abuse Working Group DKIM Implementation MAAWG Training Series Segment 3 of 4 on DomainKeys Identified Mail From the onsite training course at the MAAWG 18 th General Meeting San Francisco,

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

Error Sending Mail Message To Smtp Server. Return Code 552

Error Sending Mail Message To Smtp Server. Return Code 552 Error Sending Mail Message To Smtp Server. Return Code 552 The best mail server response code you can get. A 400-style message is usually returned when some sort of transient error is easing off the throttle

More information

Category: Standards Track January 1999

Category: Standards Track January 1999 Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Data API v1.2. SPRING Contact & Campaign SPLIO - SPRING Contact and Campaign DATA API EN v1.3.

Data API v1.2. SPRING Contact & Campaign SPLIO - SPRING Contact and Campaign DATA API EN v1.3. v1.2 SPRING Contact & Campaign 2018-02-15 SPLIO - SPRING Contact and Campaign DATA API 1.2 - EN - 2018-02-15 - v1.3.docx Table of Contents Introduction... 4 Access... 4 Base URL...4 Europe hosting... 4

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

Web Hosting Control Panel

Web Hosting Control Panel Web Hosting Control Panel cpanel Hosting refers to any web hosting plan that uses cpanel as its web hosting control panel. cpanel is the leading control panel interface in the web hosting industry today.

More information

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos  Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product

More information

TrendMicro Hosted Security. Best Practice Guide

TrendMicro Hosted  Security. Best Practice Guide TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,

More information