Forward set up. Technical team
|
|
- Aubrie Hawkins
- 5 years ago
- Views:
Transcription
1 Forward set up Technical team 09/04/2015
2 Summary Introduction... 3 Forward service description... 3 Presentation of our service... 3 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending IP address... 5 Tracking... 6 Details on returned information... 6 Datas feeds... 6 Customer data feeds... 6 Send set-up... 7 Message header... 7 MX records set-up... 8 SPF/DKIM set-up... 8 Usage... 8 Identification and authentication... 8 Qualification... 8 Integrity... 9 Used standard policies... 9 SPF (Sender Policy Framework)... 9 Sender ID DKIM (DomainKeys Identified Mail) DNS set-up
3 Introduction Forward service description This document intends to provide technical information on Splio Forward service, in order to facilitate the set up and launch. Some functional aspects are mentioned for a better understanding of the flow. smtp RELAY++ Presentation of our service Services covered The Splio Forward service is basically a SMTP relay dedicated to outsource the delivery optimisation, and returning the hard-bounces in synchronous mode, and also, as optional features, tracking and reporting in asynchronous mode. 3
4 The Splio Forward service cannot remove the sender responsibilities regarding the privacy policies and local laws. Forward can manage delegated functionalities such as: SMTP transaction procedures Spam complaints management Hard-bounces management Unsubscriptions through feed-back loops (FBL type list-unsubscribe) Immediate blacklist preventing recipient to receive a Newsletter after unsubscription Campaign events (Hard-bounces, Unsub, clicks,..) can be delivered» Through an asynchronous mode (flat file through FTP or FTP TLS)» Through a synchronous mode (SMTP or HTTP requests) (optional) Authentications» Messages can be signed with DomainKey/DKIM» SPF/Sender ID management» Sub-domain delegation (optional) Additional services :» IP reputation Monitoring ReturnPath SenderScore Certification (optional) Easy and intuitive monitoring and reporting tools Advanced reporting facilities (optional) The set-up is designed to be quick. 4
5 Service set-up Infrastructure Set-up Customer sending IP address The Splio customer is identified by a set of IP addresses. A testing environment can be set on demand. Once the credentials are communicated to the customer, the service is open only between customer and Splio, but the first messages are not relayed until further checks done by Splio. The first messages are blocked until checks are ok. Then Splio notifies the customer of the real availability of the service. 5
6 Tracking Details on returned information Returned information can be set from basic to advanced, depending on customer requirements:» No tracking In such case, the MIME content is not modified by Splio's scripts» Opening rate A web bug is added to the HTML message to monitor the opening rate. The basic set up doesn't capture personal details on openers.» Openers Through optional set up, Openers details can be captured and reported. ( address / IDuser).» Clickers rate Through optional set up, Clickers rate can be monitored (aggregated to the contact, with no link details)» Advanced tracking and reporting Trough optional set up, advanced monitoring on behavior can be captured and reported (with personal details and links used)» DualTrack As additional feature, our DualTrack can replay through an asynchronous mode the campaign activity captured in real time by Splio. DualTrack requires advanced tracking. This functionality requires a prior technical analysis and validation by Splio consultants. The tracking URL can be in https or http depending on the type or tracking. Datas feeds Customer data feeds As mentioned previously, the data captured by Splio tools can be delivered through various options:» Flat files (through FTP) 6
7 A file can be periodically delivered (by default, on a daily basis) this frequency can be increased or decreased. The file is available on FTP (secured FTP TLS is also available). The flat file structure must be agreed between customer and Splio. Usual informations are: Soft bounces Hard bounces Unsubscribes (through List-Unsubscribe) Spam complaints Usual identifiers are: CampaignID or Campaign caption RecipientID or address Action (hard/soft/spam/open/click/unsub) Data (/ IP address/used link/..) Default format is as below (separator is tab): Recipientid campaignid ext chanel from status dest1@mail.com campaign normal newsletter@company.com done dest2@mail.com campaign normal newsletter@company.com hard dest3@mail.com campaign normal newsletter@company.com soft dest4@mail.com campaign vip newsletter-vip@company.com done Send set-up Message header The Splio relay behavior and reports can be adjusted through some additional tags within the messages header. The naming convention for the tags to be monitored by Splio tools is to begin with: x- splio- 3 tags to allow post-campaign reports split: x-splio-ref : campaign identifier x-splio-extid : recipient id x-splio-canal : channel 7
8 x-splio-filteroff: Y/N : Optional disabling of the Splio blacklist. This option is dedicated to transactional messages such as ecommerce order confirmation, logistic information, etc.. It is not supposed to be used with a marketing campaign. Using this option implies a strong integration of Unsubscriptions and spam complaint management at the customer side. *Requires activation on Splio s side. Based on the presence of these tags and agreed values, the behavior of our SMTP relay can be adjusted (priority/rate/dedicated IP/header recording/tracking/billing ref/reporting aggregates/mime changes/ sender) or be retrieved while producing the data feed to the customer. MX records set-up The MX record can be updated to set mail exchanger= mail.splio.fr, depending on customer case. SPF/DKIM set-up Usage Depending of ISP internal policies, the SPF, SenderID and DKIM can be optional or mandatory to ensure the deliverability of s. Splio strongly recommends to implement the DKIM and SPF/SenderID so that the deliverability will be secured. Identification and authentication Identification is the sender value such as «user@domaine.com». The authentication stage checks that the sender name used is corresponding to the declared information accessible from a reverse lookup. Qualification Qualification assessment intends to verify the sender is accredited to send a mail. This stage comes after authentication. 8
9 Integrity This last stage occurs to check the message has been routed directly with alteration. Used standard policies SPF (Sender Policy Framework) SPF is the standard policy to which Splio complies. The SPF record information allows to declare regular IP addresses to be accepted to send s and recognized at the "MAIL FROM:" assessment (during the transaction SMTP hand check). Trying Connected to mx1.mail.eu.yahoo.com. Escape character is '^]'. 220 mta1043.mail.ird.yahoo.com ESMTP YSmtp service ready EHLO mail.splio.fr 250-mta1043.mail.ird.yahoo.com 250-8BITMIME 250-SIZE PIPELINING MAIL FROM: 250 sender ok Table 1 - Transaction SMTP initial hand check mydomain.com 3600 IN TXT "v=spf1 ip4: /21 ~all" mydomain.com 3600 IN SPF "v=spf1 ip4: /21 ~all" Table 2 - SPF/TXT record splio.fr for a dedicated setting Table 2 returns the following credentials: Any server with an IP belonging to the range /21 is allowed to use the domain splio.fr in the MAIL FROM: section Any other server is strictly not allowed to use the domain splio.fr in the MAIL FROM: section Further information on SPF options is available on the public domain. 9
10 The ISPs use SPF records to define if a message should be rejected; not setting SPF would be considered as a bad behavior. A SPF record properly set will foster the successful message delivery. Advantages SPF check-in allows to reject from the very first step of the process Inconveniences Some ISP may accept s even if the sender IP address is not compliant. Sender ID Sender ID is a Microsoft specific policy, it derivates from SPF. As the behavior is quite different, Splio recommends to comply with Microsoft policy. mydomain.com 600 IN TXT "spf2.0/pra include:spf2.splio.com ~all" Table 3 - Sender ID set up for mydomain.com Sender ID checks occur at "MAIL FROM:" assessment, similarly to SPF, but also evaluated later on the process on other fields like From:, the Sender:, etc. based on Purported Responsible Address (PRA) algorithm. Sender ID is required for Hotmail recipients. Exchange mail servers may also require the Sender ID. Advantages It allows the router to use Sender as an alternate trusted identifier. Inconveniences If the MAIL FROM: check in allows the ISP to notify the rejection from the very first step of the SMTP transaction, the deny based on SENDER ID is notified later in the process. DKIM (DomainKeys Identified Mail) DKIM allows a technical signature within the messages, independent from the Sender, From, Return-Path domain values. The Sender delivers the message with a private encrypted key, The ISP receiver server controls with the public key, published at the DNS record and certifies the authentication of the sender. 10
11 splio._domainkey.mydomain.com IN TXT "k=rsa; p= MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDFG63OUQU+COcURv/5/rD5MLkAh 3mS8c2JqskStBgMJiPTfQaxIc+qqtZAVkiud4jO5SQ5plnvRYtMnfSe+VoyGiz1j/3x5i4PUjiFKL KiGnTpvW7LcrpWwVgeRnUAqeIvACnlTc9uXv30moMvPNq4qPe1bD05oDvpxJHa12lqlwIDA QAB" Table 4 - Display of public key for DKIM signature on mydomain.com DKIM is used to establish trust between recognized sender and receiver and can shunt further filtering procedures doing so, the workload is lighter and the delivery of messages is simplified The DKIM signature is strongly recommended by Yahoo! to allow the FeedBack Loop to work. Gmail is requesting this signature. Hotmail usage of DKIM is less important. Advantages It allows to consolidate the sender reputation on one domain whatever the sender (From) uses. Inconveniences Encrypted key analysis requires more calculation resources. DNS set-up In order to ensure the authentication phases success, SPF, Sender ID and DKIM require from customer domain administrator actions on TXT records within the impacted DNS. Action can be either an insert or a change, depending if the records already exist. Warning: a new MX record might be also added, beside the SPF/SENDER ID/DKIM actions described below, depending if the subdomain dedicated to the s routed by Splio Forward is already existing or not, and well configured for abuse@ address. Case 1: Customer ensures the domains management SPF» Add «include:spf.splio.com» to the existing records or create them if missing. Note: TTL value is to be set by yourself, depending on your requirements (3600 in the example below) 11
12 Example: mydomain.com 3600 IN TXT "v=spf1 include:spf.splio.com mx a ~all" mydomain.com 3600 IN SPF "v=spf1 include:spf.splio.com mx a ~all" The example above means Splio is the dedicated router. So, for combination of several routers, please insert the include into the existing string mydomain.com TXT "v=spf1 ip4:xxx.xx.xxx.x/xx ip4:xxx.x.xxx.x/xx include:spf.splio.com include:spf.myotherrouter.com a mx ~all" Sender ID => Add «include:spf2.splio.com» to the existing records or create them if missing. Note: TTL value is to be set by yourself, depending on your requirements (3600 in the example below) Example: mydomain.com 3600 IN TXT "spf2.0/pra include:spf2.splio.com ~all" mydomain.com 3600 IN SPF "spf2.0/pra include:spf2.splio.com ~all" The example above means Splio is the dedicated router. So, for combination of several routers, please insert the include into the existing string mydomain.com TXT "spf2.0/pra include:spf2.splio.com include:sp2.myotherrouter.com a mx ~all" DKIM» option 1: Send us your private key» option 2: Add to your public keys, associated to your domain, a zone «splio._domainkey» with the following values: "k=rsa; p=migfma0gcsqgsib3dqebaquaa4gnadcbiqkbgqdfg63ouqu+cocurv/5/rd5m LkAh3mS8c2JqskStBgMJiPTfQaxIc+qqtZAVkiud4jO5SQ5plnvRYtMnfSe+VoyGiz1j/3x5i4 PUjiFKLKiGnTpvW7LcrpWwVgeRnUAqeIvACnlTc9uXv30moMvPNq4qPe1bD05oDvpxJH a12lqlwidaqab" Note: TTL value is to be set by yourself, depending on your requirements (1200 in the example below) Example: 12
13 splio._domainkey.mydomain.com IN TXT "k=rsa; p=migfma0gcsqgsib3dqebaquaa4gnadcbiqkbgqdfg63ouqu+cocurv/5/rd5mlk Ah3mS8c2JqskStBgMJiPTfQaxIc+qqtZAVkiud4jO5SQ5plnvRYtMnfSe+VoyGiz1j/3x5i4PUjiF KLKiGnTpvW7LcrpWwVgeRnUAqeIvACnlTc9uXv30moMvPNq4qPe1bD05oDvpxJHa12lqlwI DAQAB" Notes: the underscore character used by Splio may be an issue depending on your domain service provider. Mind the space at... k=rsa; p=mig... Depending on thr tool, the "k=rsa; can be displayed as "k=ksa\;» Then notify us with the subject «Activation DKIM» with details. Case 2: Customer delegates sub-domain management to splio This option is billable, check this with your Splio sales contact. The DNS admin of your domains needs to set these additional values: IN NS ns1.splio.fr. IN NS ns2.splio.fr. IN NS ns3.splio.fr. Splio can then do the additional set up on its side. Case 3: Splio manages your DNS This option is billable, check this with your Splio sales contact. 13
14 Splio, French independent group created in 2001, is software provider of Customer Experience Management in Saas mode and specialized in the retail industry. Splio, whose R&D is located in France, has a presence in three continents with offices in Paris, Barcelona, Warsaw, Beijing, Shanghai and Sao Paulo. Splio offers solutions that can easily be integrated and have the ability to meet the creative needs of marketers. 103 boulevard Haussmann Paris Tel. : +33 (0)
SMTP Relay set up. Technical team
Technical team 09/08/2016 Summary Introduction... 3 SMTP Relay service description... 3 Presentation of our service... 4 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending authentication...
More informationReport API v1.0 Splio Customer Platform
Report API v1.0 Splio Customer Platform 2018-06-25 SPLIO Customer Platform - REPORT API 1.0 - EN - 2018-06-25 - v1.docx Table of Contents Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3
More informationTrigger SMS API. API Documentation SPLIO - SPRING Contact and Campaign Trigger SMS API - EN v4.0.docx
API Documentation 2017-09-08 Summary Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3 Asia hosting... 3 Authentication... 3 Request format... 4 Response format... 4 Error Codes & Responses...
More informationFactors that Impact Deliverability
Factors that Impact Deliverability Thank you for joining us. Audio: Select Use Mic & Speakers to use VOIP or Use Telephone to get dial in number and access code. If using VOIP, it is recommended that you
More informationAccount Customer Portal Manual
Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP
More informationCommunicator. Branded Sending Domain July Branded Sending Domain
Branded Sending Domain Communicator Branded Sending Domain July 2017 Version 2.1 This document includes instructions on how to set up a new sender domain and ensure this is configured correctly. Contents
More informationTechnical Brief: DYN DELIVERY
Technical Brief: DYN EMAIL DELIVERY 603 668 4998 Technical Brief: Dyn Email Delivery Introduction Dyn s Email Delivery platform allows reputable senders to send both bulk and transactional emails to their
More informationMarketing 201. March, Craig Stouffer, Pinpointe Marketing (408) x125
Email Marketing 201 Tips to Increase Email Delivery (aka Why Good Email Goes Bad ) March, 2009 Craig Stouffer, Pinpointe Email Marketing cstouffer@pinpointe.com (408) 834-7577 x125 Gary Halliwell CEO,
More informationOptimization of your deliverability: set up & best practices. Jonathan Wuurman, ACTITO Evangelist
Optimization of your email deliverability: set up & best practices Jonathan Wuurman, ACTITO Evangelist ACTITO Webinar Tour Replays & presentations available at www.actito.com/nl Our mission We help our
More informationAnti-Spoofing. Inbound SPF Settings
Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging
More informationOffice 365: Secure configuration
Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationSecuring, Protecting, and Managing the Flow of Corporate Communications
Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant
More informationMail Assure. Quick Start Guide
Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up
More informationMail Assure Quick Start Guide
Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4
More informationSynology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0
Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet
More informationTable of content. Authentication Domain Subscribers Content Sending practices Conclusion...
A User Guide Before sending your carefully-crafted email campaigns, it s important to first understand a few basic ideas and rules of email marketing to ensure your campaigns are successful. To achieve
More informationBest Practices. Kevin Chege
Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently
More informationBased on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman
DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic
More informationHow to Configure Esva for Office365
How to Configure Esva for Office365 This article addresses configuring Office 365 with Libra Esva as your inbound and/or outbound mail gateway. You can specify the appliance as an inbound mail gateway
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationInstructions Microsoft Outlook 2007 Page 1
Instructions Microsoft Outlook 2007 Page 1 Instructions Microsoft Outlook 2007 This manual is written for users who already have an e-mail account configured in Outlook 2007 and will therefore only focus
More informationSMS Relay. API Documentation SPLIO - SPRING Contact and Campaign SMS Relay API - EN v1.2.docx
SMS Relay API Documentation 2017-09-07 Summary Introduction... 3 Access... 3 Base URL... 3 Europe hosting... 3 Asia hosting... 3 Authentication... 3 Single call... 4 Bulk call... 4 Transactional messages...
More informations and Anti-spam
E-mails and Anti-spam Standard authentication AUTH method As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send e-mails from your webcrm system, we use
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationDomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.
DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name
More informationAWEBDESK MARKETER
AWEBDESK EMAIL MARKETER Version 6.1.0 AwebDesk Softwares Feedback Loop Set-Up Guide Edition 1.0 March 2012 1 P a g e What is a feedback loop? Some ISPs offer a feedback loop service for senders. When a
More informationOctober 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo
Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document
More informationHOW-TO GUIDE. How to Optimize Your s for Deliverability
HOW-TO GUIDE How to Optimize Your Emails for Deliverability The Problem Email Reputation Your ability to market to your audience is based on sending emails from your Email Service Provider, or ESP. ESPs
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationIntroduction to Antispam Practices
By Alina P Published: 2007-06-11 18:34 Introduction to Antispam Practices According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number
More informationManaging Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.
Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to
More informationInstructions Microsoft Outlook 2010 Page 1
Instructions Microsoft Outlook 2010 Page 1 Instructions Microsoft Outlook 2010 This manual is written for users who already have an e-mail account configured in Outlook 2010 and will therefore only focus
More informationOffice 365 Standalone Security
The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page
More informationA Federal Agency Guide to Complying with Binding Operational Directive (BOD) 18-01
Table of Contents Introduction... 2 Required Actions Overview... 2 Required Actions Email Security... 3 Required Actions Web Security... 9 Status of Implementation... 11 Roles and Responsibilities... 11
More informationTeach Me How: B2B Deliverability in a B2C World
Teach Me How: B2B Deliverability in a B2C World Chris Arrendale CEO & Principal Deliverability Strategist Inbox Pros (www.inboxpros.com) @Arrendale Agenda - Outline Delivery versus Deliverability Provisioning
More informationDeliverability 2016: It s beyond just reaching the inbox
Deliverability 2016: It s beyond just reaching the inbox Agenda A Decade of Deliverability Deliverability: 2006 Deliverability: 2016 The Future of Deliverability Management Innovative Preview Demonstration
More informationInstructions Microsoft Outlook 2003 Page 1
Instructions Microsoft Outlook 2003 Page 1 Instructions Microsoft Outlook 2003 This manual is written for users who already have an e-mail account configured in Outlook 2003 and will therefore only focus
More informationKantanMT.com. Security & Infra-Structure Overview
KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...
More informationi-mscp OpenDKIM plugin
2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.
More informationDeliverability Terms
Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help
More informationAuthentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER
Email Authentication GUIDE Frequently Asked QUES T ION S T OGETHER STRONGER EMAIL AUTHENTICATION Marketers that use email for communication and transactional purposes should adopt and use identification
More informationStep 2 - Deploy Advanced Security for Exchange Server
Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service
More informationDefining Which Hosts Are Allowed to Connect Using the Host Access Table
Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts
More informationDKIM Implementation How
DKIM Implementation How Murray S. Kucherawy Principal Engineer, Cloudmark June 8, 2009 Planning Your Deployment Selecting Key Rotation Policy How long do your keys live? Similar in nature to your password
More informationInstructions Microsoft Outlook 2013 Page 1
Instructions Microsoft Outlook 2013 Page 1 Instructions Microsoft Outlook 2013 This manual is written for users who already have an e-mail account configured in Outlook 2013 and will therefore only focus
More informationPardot Setup Implementation Guide
Pardot Setup Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: May 31, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
More informationDefining Which Hosts Are Allowed to Connect Using the Host Access Table
Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, on page 1 Defining Remote
More informationComendo mail- & spamfence
Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...
More information========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version
========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version 9.5.1 software update notes =========================================================================
More informationTop 10 Deliverability Best Practices. #ActOnSW
Top 10 Deliverability Best Practices Today s Presenter David Fowler Act-On Chief Privacy & Deliverability Officer david.fowler@act-on.net Agenda The Deliverability Ecosystem Top 10 Best Practices Common
More informationDigital Messaging Center Feature List
Digital Messaging Center Feature List Connecting Brands to Consumers Teradata Overview INTEGRATED DIGITAL MESSAGING Deliver Digital Messages with Personalized Precision Teradata s Digital Messaging Center
More informationAdvanced Marketing Certification Training
Advanced Email Marketing Certification Training Duration: 25+ hours; e-learning content PREREQUISITES Although not required, ideally, participants will first complete our Email Marketing Foundations course.
More informationMail Reporting. User Guide - Table of Contents. Overview. Use Case(s) Accessing the Tool. Mail Reporting Tools. Sent s.
Mail Reporting 2016 - Fall Edition User Guide - Table of Contents Overview Use Case(s) Accessing the Tool Mail Reporting Tools Sent Emails Message Details Scheduled Emails Unsubscribe Bounce Blacklist
More informationDNS Management with Blue Cat Networks at PSU
DNS Management with Blue Cat Networks at PSU Network and System Administrators at Penn State can make their own DNS changes, live, using the Blue Cat Proteus web-based interface. Proteus will be used by
More informationDeliverability Webinar: Factors that Impact Deliverability Hosted by the emarketing Learning ebizitpa
Email Deliverability Webinar: Factors that Impact Deliverability Hosted by the emarketing Learning Center @ ebizitpa Question and Answer Session January 29, 2009 Q: In regards to the slide entitled Step
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationOffice 365 Inbound and Outbound SMX configuration. 4 th January 2018
Office 365 Inbound and Outbound SMX configuration 4 th January 2018 Legal Notice Copyright 2005-2018 SMX Limited. All rights reserved. The contents of this document constitute valuable proprietary and
More informationDKIM Implementation. Messaging Anti-Abuse Working Group. Segment 3 of 4 on DomainKeys Identified Mail. MAAWG Training Series
Messaging Anti-Abuse Working Group DKIM Implementation MAAWG Training Series Segment 3 of 4 on DomainKeys Identified Mail From the onsite training course at the MAAWG 18 th General Meeting San Francisco,
More informationWeCloud Security. Administrator's Guide
WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including
More informationvbulletin and VerticalResponse
vbulletin and VerticalResponse Email Campaigns Made Easy May 16, 2011 Page 1 VerticalResponse, Inc. Introduction VerticalResponse Team Christina Hoheisel Business Development Manager christina@verticalresponse.com
More informationGuide To Navigating POPI
Guide To Navigating POPI July 2014 Table of Contents Introduction 3 About this Guide 4 10 Points to Consider on the Road to POPI Compliance 5 - Specific Business Purpose or Consent 6 - Maintain the Quality
More informationWHITEPAPER Rewrite Services. Power365 Integration Pro
WHITEPAPER Email Rewrite Services Power365 Integration Pro Table of Contents The Challenge... 3 The Binary Tree Solution... 3 What to Expect... 3 Day 1 Email Rewrite Services... 3 Day 2 Email Rewrite Services...
More informationInstructions Eudora OSE Page 1
Instructions Eudora OSE Page 1 Instructions Eudora OSE This manual is written for users who already have an e-mail account configured in Eudora OSE and will therefore only focus on how to change the SMTP
More informationMail Assure. User Guide - Admin, Domain and Level
Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Friday, June 15, 2018 ----------- 2018 CONTENTS Getting Started 1 Useful Links 1 What's New 1 Accessing Mail Assure 6 User Permissions
More informationCertification. Standards and Requirements. December Return Path, Inc.
Certification Standards and Requirements December 2017 Return Path, Inc. Table of Contents Introduction... 4 What are the standards and requirements for becoming and staying Certified?... 4 Why do we hold
More informationData API v1.2. SPRING Contact & Campaign SPLIO - SPRING Contact and Campaign DATA API EN v1.3.
v1.2 SPRING Contact & Campaign 2018-02-15 SPLIO - SPRING Contact and Campaign DATA API 1.2 - EN - 2018-02-15 - v1.3.docx Table of Contents Introduction... 4 Access... 4 Base URL...4 Europe hosting... 4
More informationMarketing Best Practices that Maximize Deliverability
Marketing Email Best Practices that Maximize Deliverability The rules have changed for email as a marketing tools. Sophisticated email receivers like Gmail have taken engagement-based actions to new levels
More informationTrendMicro Hosted Security. Best Practice Guide
TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,
More informationOverview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...
Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Email Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome
More informationFortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional
Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email
More informationVersion SurfControl RiskFilter - Administrator's Guide
Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with
More informationMcAfee Gateway Appliance Patch 7.5.3
Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation
More informationAutomatic Delivery Setup Guide
for GuideSpark Communicate Cloud Table of Contents Summary: Working with Automatic Email Delivery... 1 What your IT department needs to know... 2 Prerequisite: Select a Targeted Audience... 3 Enable Automatic
More informationBuilding a Scalable, Service-Centric Sender Policy Framework (SPF) System
Valimail White Paper February 2018 Building a Scalable, Service-Centric Sender Policy Framework (SPF) System Introduction Sender Policy Framework (SPF) is the protocol by which the owners of a domain can
More informationCompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network
More informationSetting Up in Daycare Works Help. Version: 06/25/2013
Setting Up Email in Daycare Works Help Version: 06/25/2013 Table of Contents Table of Contents 2 How to Setup a SMTP Server 3 Setting up an SMTP server allows administrators the ability to route emails
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationSMTP Settings for Magento 2
For more details see the Delete Order for Magento 2 extension page. SMTP Email Settings for Magento 2 Send only reliable emails from a popular local hosting or a custom Magento 2 SMTP server. Run tests
More informationEmpowering Marketing and Sales using CRM and ClickDimensions
Empowering Marketing and Sales using CRM and ClickDimensions Steven Foster 16 th May 2012 Steven.foster@intergen.co.nz @FozzyNZ http://www.linkedin.com/in/stevefoster http://nakedcrm.com http://www.intergen.co.nz/blog
More informationDomain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationTo create a few test accounts during the evaluation period, use the Manually Add Users steps.
Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page,
More informationConfiguring Gmail (G Suite) with Cisco Cloud Security
Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.
More informationSingle Sign-On. Introduction
Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationG-Lock EasyMail7. Startup Guide. Client-Server Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit
G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with
More informationData API v1.9. Splio Customer Platform SPLIO Customer Platform - DATA API EN v1.docx
Data API v1.9 Splio Customer Platform 2018-08-20 SPLIO Customer Platform - DATA API 1.9 - EN - 2018-08-20- v1.docx Table of Contents Introduction... 4 Access... 4 Base URL...4 Europe hosting... 4 Asia
More informationCategory: Standards Track January 1999
Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document
More informationMDaemon Vs. Kerio Connect
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationFranzes Francisco Manila IBM Domino Server Crash and Messaging
Franzes Francisco Manila IBM Domino Server Crash and Messaging Topics to be discussed What is SPAM / email Spoofing? How to identify one? Anti-SPAM / Anti-email spoofing basic techniques Domino configurations
More informationEVRY Security. Administrator's Guide
EVRY Email Security Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security provides a variety of useful features within a user-friendly web console to manage the functions
More informationDelivery to the Big Four: AOL, Google, Microsoft, and Yahoo
Email Delivery to the Big Four: AOL, Google, Microsoft, and Yahoo A White Paper on How Email Deliverability Differs Between the Four Most Popular Global Email Providers Patrick Owens Email Technology Specialist
More informationConfiguration Section
8 Configuration Section MailCleaner can be easily customized to fit your needs and your working style. The Configuration menu contains six sections: Interface, Address groups, Address settings, Quarantine
More informationMDaemon Vs. IceWarp Unified Communications Server
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationDMARC ADOPTION AMONG e-retailers
DMARC ADOPTION AMONG e-retailers Q1 2018 Almost 90% of Top US and EU e-retailer Domains Fail to Protect Consumers from Phishing Attacks Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE
More informationto Stay Out of the Spam Folder
Tips and Tricks to Stay Out of the Spam Folder At SendGrid we are very serious about email deliverability. We live and breathe it each day. Similar to how Google keeps adjusting its search algorithm to
More informationUnderstanding the Pipeline
This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of
More informationApril 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:
More informationChapter 62 Simple Mail Transfer Protocol
Chapter 62 Simple Mail Transfer Protocol You've got Mail! President Bush said for security reasons, he's sworn off all e-mail communication. He will not be using email at the White House at all. Is that
More informationMDaemon Vs. MailEnable Enterprise Premium
Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP
More informationContents. Limitations. Prerequisites. Configuration
Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically
More information