<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[SendForensics Blog]]></title><description><![CDATA[The official SendForensics blog]]></description><link>https://www.sendforensics.com/blog/</link><image><url>https://www.sendforensics.com/blog/favicon.png</url><title>SendForensics Blog</title><link>https://www.sendforensics.com/blog/</link></image><generator>Ghost 5.8</generator><lastBuildDate>Tue, 12 May 2026 19:54:03 GMT</lastBuildDate><atom:link href="https://www.sendforensics.com/blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[How to use Google Postmaster Tools for deliverability monitoring]]></title><description><![CDATA[An essential tool in email deliverability is Google Postmaster Tools. It contains data straight from Google, making it the most accurate source for metrics like complaint rates. Here's how to use it.]]></description><link>https://www.sendforensics.com/blog/google-postmaster-tools/</link><guid isPermaLink="false">65657d29849f60e23a0bffe3</guid><category><![CDATA[Deliverability]]></category><category><![CDATA[Tutorials]]></category><dc:creator><![CDATA[Dee Mirai]]></dc:creator><pubDate>Tue, 30 Jan 2024 13:23:17 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1637593992672-ed85a851fdc3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fGdtYWlsfGVufDB8fHx8MTcwNjYyMDk3Nnww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1637593992672-ed85a851fdc3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fGdtYWlsfGVufDB8fHx8MTcwNjYyMDk3Nnww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="How to use Google Postmaster Tools for deliverability monitoring"><p>If you want to improve your deliverability and email marketing performance, you have to track, measure, and optimize your emails. </p><p>Monitoring key deliverability metrics is important because it allows you to react to things that can impact your email deliverability, like a high spam complaint rate.</p><p>Higher email deliverability = more people reached = higher ROI on your emails.</p><p>One of the essential tools in email deliverability is Google Postmaster Tools. It contains data straight from Gmail, making it the most accurate source for metrics like complaint rates.</p><h2 id="what-is-google-postmaster-tools">What is Google Postmaster Tools?</h2><p>Google Postmaster Tools is a free tool from Google that gives you access to your email performance and reputation data. Their data includes gmail.com, googlemail.com, and paid Google Workspace addresses.</p><p>It&#x2019;s worth signing up even if Gmail isn&#x2019;t your primary target. Understanding how Google perceives your emails can help you understand how other ISPs like Microsoft see them. </p><p>For privacy reasons, data will only show if you&#x2019;re sending enough emails to Google inboxes. Google doesn&#x2019;t publish the threshold, but it seems to be upwards of around 300 emails per day to Google recipients.</p><h2 id="how-to-sign-up-for-google-postmaster-tools">How to sign up for Google Postmaster Tools</h2><p>To use Google Postmaster Tools, you&#x2019;ll first need a Google account. </p><p>Then, <a href="https://www.gmail.com/postmaster/">Sign up or log in to Google Postmaster</a> with your Google account. After selecting Get Started, you&#x2019;ll be asked to add your domain. <br></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/aYnhMqm0-n95tYfNmn5SzQTuSYZFHXZSZcHUzHUgH8B2Co7Y6qnuO-ocvhKQFB0vwul8bbMZziuMks7XQyn6zEYUCr93fx97bfH74JQgvTq74XcYjXdVD7HvtVeuwqlSnafYM9s1Q1v-Vs31oUAqh-A" class="kg-image" alt="How to use Google Postmaster Tools for deliverability monitoring" loading="lazy"></figure><p>Select Next, and you&#x2019;ll be asked to verify your domain ownership. </p><p>Log into your DNS provider (like GoDaddy or Namecheap) and add the TXT record provided, then go back to Google Postmaster and click on Verify. Once the record is properly published and Google can find it, you&#x2019;ll see the domain status change to Verified. <br></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/oFLe-73_Qkm5l5gV7up8HuvNPspzO0luIbOZ3yOGIut5bGjT-AgZgVxKe9EAHXuaUXY2FlMP8nEpKGbrs8GbyOd6EylWFcb0yTIHZwC_j3gavAdDOci91CDTCidsd0UjwAZltz9jJQ1ID7NFnD9UZQY" class="kg-image" alt="How to use Google Postmaster Tools for deliverability monitoring" loading="lazy"></figure><p>That&#x2019;s it. Don&#x2019;t later remove the DNS record you added, or you&#x2019;ll lose the verification status.</p><h2 id="google-postmaster-tools-deliverability-metrics-to-monitor-and-how">Google Postmaster Tools deliverability metrics to monitor (and how)</h2><p>To get started with deliverability monitoring, you&#x2019;ll need to track these: </p><ul><li>Spam complaint rate</li><li>IP reputation</li><li>Domain reputation</li><li>Authentication success rate</li><li>Delivery errors</li></ul><h3 id="spam-complaint-rate">Spam complaint rate</h3><p>The spam rate is the percentage of emails marked as spam by users versus emails sent to the inbox. This metric becomes even more important in 2024 when <a href="https://www.sendforensics.com/blog/understanding-google-and-yahoos-new-bulk-sender-requirements">Google starts to require a spam rate of less than 0.3%</a>. </p><p>While useful, the spam rate doesn&#x2019;t provide the full picture. That&#x2019;s because it specifically refers to spam <em>complaints</em>. You could see a low spam rate even if your emails are being delivered directly to spam &#x2014; people can&#x2019;t complain about your emails if they don&#x2019;t see them. </p><h3 id="ip-reputation">IP reputation</h3><p>IP reputation is how emails originating from your sending IP are perceived. A higher IP reputation means emails from this IP are more likely to reach inboxes. A low IP reputation can result in your emails being sent directly to spam. </p><p>Google Postmaster Tools splits IP reputation into four categories. The definition of spam here includes email reported by users as spam (this is the spam complaints metric mentioned above) <em>and</em> email detected by Gmail&#x2019;s spam filter. &#xA0;</p><ul><li><strong>Bad</strong>: A history of sending a high volume of spam. Mail from this IP will almost always be rejected or marked as spam.</li><li><strong>Low</strong>: Known to send a considerable volume of spam. Mail from this IP will likely be marked as spam.</li><li><strong><strong><strong>Medium/Fair</strong>: Known to send good email, but has occasionally sent a low volume of spam. Most email from this IP will have a fair deliverability rate unless there&#x2019;s a significant increase in spam levels.</strong></strong></li><li><strong>High</strong>: A good track record of a very low spam rate, and complies with Gmail&#x2019;s sender guidelines. Mail will rarely be marked by the spam filter.</li></ul><p>If you&#x2019;re using a shared IP address like most people, your IP reputation is <em>also</em> shared among everyone sending from that IP. That&#x2019;s why it&#x2019;s important to pick a reputable email service provider that doesn&#x2019;t allow spammers.</p><h3 id="domain-reputation">Domain reputation</h3><p>Like IP reputation, domain reputation is how emails from your sending domain are perceived. </p><ul><li><strong><strong><strong>Bad: </strong>A history of sending a high volume of spam. Mail from this domain will almost always be rejected or marked as spam.</strong></strong></li><li><strong>Low</strong>: Known to send a considerable volume of spam. Mail from this domain will likely be marked as spam.</li><li><strong><strong><strong>Medium/Fair</strong>: Known to send good email, but has occasionally sent a low volume of spam. Most email from this domain will have a fair deliverability rate unless there&#x2019;s a significant increase in spam levels.</strong></strong></li><li><strong>High</strong>: A good track record of a very low spam rate, and complies with Gmail&#x2019;s sender guidelines. Mail will rarely be marked by the spam filter.</li></ul><p>Domain reputation within GPT refers only to the domain you use to send emails, like acme.com or newsletters.acme.com. However, though individual subdomains carry their own reputation, they do also share in the reputational pool of the primary domain and other subdomains so it is a good idea to make sure all are reported on.</p><h3 id="authentication-success-rate">Authentication success rate</h3><p>Email authentication refers to your SPF, DKIM, and DMARC. Properly authenticated emails is an indicator of non-spam email, and in 2024 DMARC compliance is required by Google. </p><p>A high authentication success rate means your emails are secured and passing authentication tests, which can help improve deliverability. </p><p>Google Postmaster Tools shows the percentage of emails that passed SPF, DKIM, and DMARC over all received emails that attempted authentication. </p><ul><li><strong>SPF graph</strong>: the percentage of emails that passed SPF versus all email from your domain that attempted SPF.</li><li><strong>DKIM graph</strong>: the percentage of emails that passed DKIM versus all email from your domain that attempted DKIM.</li><li><strong>DMARC graph</strong>: the percentage of emails that passed DMARC alignment versus all email received from your domain that passed either SPF or DKIM. <br></li></ul><h3 id="delivery-errors">Delivery errors</h3><p>Delivery errors tell you why your emails aren&#x2019;t being delivered. Google Postmaster Tools shows what percentage of your total emails were rejected or temporarily failed as compared to all authentic traffic. <br></p><ul><li><strong><strong><strong>Rate limit exceeded</strong>: your domain or IP is sending at a suspiciously high rate and you&#x2019;ve been temporarily limited.</strong></strong></li><li><strong><strong><strong>Suspected spam</strong>: your email is suspected to be spam by Google.</strong></strong></li><li><strong><strong><strong>Email content is possibly spammy</strong>: your email is suspected to be spam, but specifically<em> </em>because of its content. In this case, you can use <a href="https://www.sendforensics.com/features/deliverability-analysis/">SendForensics</a> to analyze your email content for spam triggers.</strong></strong></li><li><strong><strong><strong>Bad or unsupported attachment</strong>: your email contains attachments not supported by Gmail, like .bat or .exe.</strong></strong></li><li><strong><strong><strong>DMARC policy of the sender domain</strong>: your DMARC policy is reject and this email failed DMARC.</strong></strong></li><li><strong><strong><strong>Sending IP has a low reputation: </strong>your IP reputation is very low.</strong></strong></li><li><strong><strong><strong>Sending domain has a low reputation: </strong>your domain reputation is very low.</strong></strong></li><li><strong><strong><strong>IP is in one or more public RBLs: </strong>your IP is listed on a real-time blackhole list.</strong></strong></li><li><strong><strong><strong>Domain is in one or more public RBLS</strong>: your domain is listed on a real-time blackhole list.</strong></strong></li><li><strong><strong><strong>Bad or missing PTR record: </strong>your IP is missing a DNS pointer (PTR) record.</strong></strong></li></ul><p>Ideally you won&#x2019;t run into any delivery errors &#x2014; but if you do, this is a starting point for troubleshooting. &#xA0;You can then use a tool like <a href="https://www.sendforensics.com/features/deliverability-analysis/">SendForensics</a> to analyze the emails for the source of these issues.</p><h3 id="encryption">Encryption</h3><p>The encryption dashboard shows what percentage of your inbound and outbound traffic is TLS encrypted. </p><p>If your email system is set up for TLS, it will attempt to negotiate TLS encryption with every server you send to or receive from. Emails sent using a non-TLS connection to an account that&#x2019;s expecting encryption will likely be rejected. </p><p>Your encryption pass rate should always be 100%. If it isn&#x2019;t, contact your email service provider.</p><h3 id="feedback-loop-fbl">Feedback Loop (FBL)</h3><p>There&#x2019;s another graph Google Postmaster Tools offers: the feedback loop. ISPs use feedback loops to tell senders about spam complaints.<br></p><p>Gmail&#x2019;s feedback loop is only available to email service providers. It&#x2019;s an aggregated FBL, so reports are rolled up into identifiers you define in the Feedback-ID header. <br></p><p>If you&#x2019;re not an ESP, you can&#x2019;t access this data. <br></p><h2 id="final-thoughts">Final thoughts</h2><p>Sender reputation is a core part of email deliverability. There&#x2019;s a lot you can do with GPT, but there&#x2019;s some parts of deliverability monitoring only premium deliverability tools can do:<br></p><ul><li><strong>Deliverability analysis</strong>. A premium deliverability tool analyzes your entire email and sending infrastructure for problems. Optimizing emails is easier when you can see what content looks spammy, and you can troubleshoot delivery errors like missing PTR records.</li><li><strong>DMARC monitoring</strong>. With a platform like SendForensics&#x2019; DMARC monitoring, you can troubleshoot emails that failed DMARC tests and see how to fix it.</li><li><strong><strong><strong>Alerts</strong>. Google Postmaster Tools doesn&#x2019;t let you know if there&#x2019;s a problem. Platforms like SendForensics monitor your GPT data in the background and send you notifications when there&#x2019;s a reputation issue. </strong></strong></li></ul><p>SendForensics integrates directly with Google Postmaster Tools. See your GPT data directly in SendForensics next to other reputation signals like campaign performance, and use alerts to monitor your reputation and get notified when something goes wrong. <br></p>]]></content:encoded></item><item><title><![CDATA[Don't Panic! Last minute compliance for Google updates]]></title><description><![CDATA[There's only a couple days left until Yahoo and Google roll out their new bulk sender updates. Emails that don't comply with the new updates may start seeing higher rejection and spam placement rates. ]]></description><link>https://www.sendforensics.com/blog/last-minute-compliance-checklist-for-google-updates/</link><guid isPermaLink="false">65b8c22b654c6a158d3990a1</guid><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Tue, 30 Jan 2024 13:21:21 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1557200134-90327ee9fafa?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGVtYWlsfGVufDB8fHx8MTcwNjU5OTA2MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1557200134-90327ee9fafa?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGVtYWlsfGVufDB8fHx8MTcwNjU5OTA2MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Don&apos;t Panic! Last minute compliance for Google updates"><p>There&apos;s only a couple days left until Yahoo and Google are due to begin rolling out their <a href="https://www.sendforensics.com/blog/understanding-google-and-yahoos-new-bulk-sender-requirements/">new bulk sender updates</a>. Emails that don&apos;t comply with the new updates may start seeing higher rejection and spam placement rates. </p><p>A lot is changing, but if you&apos;re late to the game or strapped for time, these are arguably the two most important changes to implement:</p><ul><li><strong>Basic DMARC compliance </strong>(if you send &gt;5,000 emails per day)</li><li><strong>Keeping your spam complaint rate under 0.3% </strong>(regardless of sending volume)</li></ul><p>Read on for two very quick help snippets. You might be closer to compliance than you think!</p><h2 id="making-sure-emails-are-dmarc-authenticated">Making sure emails are DMARC authenticated</h2><p>If you&apos;re not sure where to start, here&apos;s a flowchart to help. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.sendforensics.com/blog/content/images/2024/01/Yahoogle-PANIK-.png" class="kg-image" alt="Don&apos;t Panic! Last minute compliance for Google updates" loading="lazy" width="1200" height="1500" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2024/01/Yahoogle-PANIK-.png 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2024/01/Yahoogle-PANIK-.png 1000w, https://www.sendforensics.com/blog/content/images/2024/01/Yahoogle-PANIK-.png 1200w" sizes="(min-width: 720px) 720px"><figcaption>*relax by monitoring your Google Postmaster Tools spam rate..</figcaption></figure><p>Google and Yahoo will now start <strong>requiring </strong>DMARC authentication for higher-volume senders. However, for this update a <code>p=none</code> policy is enough for basic compliance without disruption &#x2014; though we recommend eventually moving to a <code>quarantine</code> policy. </p><p>If that means nothing to you, this article should make you a casual expert in no time:</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.sendforensics.com/blog/beginners-guide-to-dmarc-2023/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Beginner&#x2019;s Guide to DMARC (2023)</div><div class="kg-bookmark-description">DMARC secures your email from spoofing. Learn how DMARC works with example policies and reports from Stripe and Amazon.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.sendforensics.com/blog/content/images/size/w256h256/2022/08/vertical-logo.png" alt="Don&apos;t Panic! Last minute compliance for Google updates"><span class="kg-bookmark-author">SendForensics Blog</span><span class="kg-bookmark-publisher">Dee Mirai</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://www.sendforensics.com/blog/content/images/2023/11/image--1-.png" alt="Don&apos;t Panic! Last minute compliance for Google updates"></div></a></figure><p>If you&apos;re already passing SPF and DKIM, then DMARC compliance is probably not far away. And if you&apos;re already using SendForensics, you can simply log in and upload our starter DMARC record to your DNS provider. </p><p>Your next email analyses will likely show compliance and you&apos;ll start seeing real-world compliance data within 48 hours to prove it. Alternatively, read the following guide for self-implementation:</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.sendforensics.com/blog/how-to-implement-dmarc-step-by-step-guide/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">How to Implement DMARC (Step-by-step Guide)</div><div class="kg-bookmark-description">Not sure how to set up DMARC? Follow this step-by-step guide to upload a basic DMARC policy and start receiving aggregate reports.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.sendforensics.com/blog/content/images/size/w256h256/2022/08/vertical-logo.png" alt="Don&apos;t Panic! Last minute compliance for Google updates"><span class="kg-bookmark-author">SendForensics Blog</span><span class="kg-bookmark-publisher">Leo Hatton</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://www.sendforensics.com/blog/content/images/2023/11/dmarc.jpg" alt="Don&apos;t Panic! Last minute compliance for Google updates"></div></a></figure><h2 id="sign-up-for-google-postmaster-tools">Sign up for Google Postmaster Tools</h2><p>Your spam complaint rate must remain below 0.3% if you send more than 5,000 emails per day to Gmail inboxes. This threshold is based on the number of people who receive your emails and manually report them as spam &#x2014; not when your email actually lands in spam (if it isn&apos;t being seen, it can&apos;t be complained about!). </p><p><a href="https://www.gmail.com/postmaster/">Google Postmaster Tools</a> is completely free and monitors your sending reputation with Gmail, which includes providing the all-important complaint rate metric. Keep a constant watch for signs of approaching the 0.3% threshold so action can be taken pre-emptively.</p><p>If you&apos;re a SendForensics user, you can integrate natively with Google Postmaster Tools to track complaint rates in your Reputation dashboard along with other email metrics. This way, you can also set alerts to get notified the moment your complaint rate approaches the threshold. </p>]]></content:encoded></item><item><title><![CDATA[Understanding Google and Yahoo's new bulk sender requirements]]></title><description><![CDATA[In February 2024, Google and Yahoo are introducing new requirements for bulk senders. See how these changes will affect your email marketing and deliverability.]]></description><link>https://www.sendforensics.com/blog/understanding-google-and-yahoos-new-bulk-sender-requirements/</link><guid isPermaLink="false">6555cfae849f60e23a0bfe1f</guid><category><![CDATA[News]]></category><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Dee Mirai]]></dc:creator><pubDate>Thu, 16 Nov 2023 13:14:27 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2023/11/gmail_security_policies_hero_2.width-1600.format-webp-1.webp" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2023/11/gmail_security_policies_hero_2.width-1600.format-webp-1.webp" alt="Understanding Google and Yahoo&apos;s new bulk sender requirements"><p>In February 2024, both Yahoo and Google will be releasing a major update that affects how you send email to Gmail and Yahoo/AOL inboxes. These new requirements affect free Gmail accounts, Google Workspace accounts, Yahoo Mail, and AOL.</p><p>Here&apos;s how Google described the update in their announcement:</p><blockquote><em>Starting in 2024, we&#x2019;ll require bulk senders to authenticate their emails, allow for easy unsubscription and stay under a reported spam threshold.</em></blockquote><p>There are two sets of requirements for bulk senders: senders who send less than 5,000 emails per day to Gmail/Workspace inboxes, and those who send more. Here&apos;s what they&apos;ll require from all bulk senders:</p><ul><li>Set up SPF <strong>or</strong> DKIM authentication</li><li>Ensure that sending domains and their respective sending IPs have valid forward and reverse DNS records</li><li>Keep spam rates reported in Google Postmaster Tools below 0.3%</li><li>Format messages according to the Internet Message Format standard (RFC 5322)</li><li>Don&apos;t impersonate Gmail From: headers</li><li>If you regularly forward email, add ARC headers to outgoing email</li></ul><p>And if you send more than 5,000 emails per day, you also need to:</p><ul><li>Set up SPF <strong>and</strong> DKIM authentication</li><li>Set up DMARC authentication and pass DMARC alignment</li><li>Enable one-click unsubscribe with a clearly visible unsubscribe link</li></ul><p>Note: while this article refers to Google, Yahoo&#x2019;s requirements are stated to be the same.</p><h2 id="when-do-i-have-to-comply-with-the-google-changes"><strong>When do I have to comply with the Google changes?</strong></h2><p>The update will be released February 1st, 2024. If you currently send over 5,000 emails per day to Gmail accounts, Google recommends working on these changes immediately.</p><p>To prevent potential deliverability problems in February, you should start looking at how to fulfil these requirements now.</p><h2 id="what-are-the-new-requirements-for-sending-to-gmail-accounts"><strong>What are the new requirements for sending to Gmail accounts?</strong></h2><h3 id="1-set-up-spf-andor-dkim-authentication"><strong>1. Set up SPF and/or DKIM authentication</strong></h3><p>SPF and DKIM are two core email authentication methods. Not only do SPF and DKIM protect your emails individually, but they&#x2019;re also needed for DMARC.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.sendforensics.com/blog/content/images/2023/11/Screenshot-2023-11-16-at-16.43.03.png" class="kg-image" alt="Understanding Google and Yahoo&apos;s new bulk sender requirements" loading="lazy" width="1141" height="761" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/11/Screenshot-2023-11-16-at-16.43.03.png 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2023/11/Screenshot-2023-11-16-at-16.43.03.png 1000w, https://www.sendforensics.com/blog/content/images/2023/11/Screenshot-2023-11-16-at-16.43.03.png 1141w" sizes="(min-width: 720px) 720px"><figcaption>SPF and DKIM testing with SendForensics</figcaption></figure><h3 id="2-have-valid-forward-and-reverse-dns-records"><strong>2. Have valid forward and reverse DNS records</strong></h3><p>Your sending domain and its respective sending IP(s) must have valid forward and reverse DNS records (also called PTR records). PTR records verify that the sending hostname is associated with the sending IP address.</p><p>You probably already have a valid forward DNS record, but you might need to set up a reverse DNS record if it hasn&apos;t already been done for you by an ESP (especially if you are using a dedicated IP). See your forward and reverse DNS records and test results in SendForensics&apos; infrastructure analysis:</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/blog/content/images/2023/11/Screenshot-2023-11-16-at-16.47.29.png" class="kg-image" alt="Understanding Google and Yahoo&apos;s new bulk sender requirements" loading="lazy" width="1107" height="655" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/11/Screenshot-2023-11-16-at-16.47.29.png 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2023/11/Screenshot-2023-11-16-at-16.47.29.png 1000w, https://www.sendforensics.com/blog/content/images/2023/11/Screenshot-2023-11-16-at-16.47.29.png 1107w" sizes="(min-width: 720px) 720px"></figure><p>If both rDNS tests pass, your PTR record is valid. You can also check your PTR record with <a href="https://toolbox.googleapps.com/apps/dig/#PTR/">Google&apos;s Dig tool</a>.</p><h3 id="3-keep-your-google-postmaster-tools-spam-rate-below-03"><strong>3. Keep your Google Postmaster Tools spam rate below 0.3%</strong></h3><p><a href="https://gmail.com/postmaster/">Google Postmaster Tools</a> is a free tool that monitors your Google reputation. If you&#x2019;re already exceeding a 0.3% spam rate regularly, you&#x2019;re probably already seeing some deliverability issues. Once the changes kick in, this will get worse.</p><p>Monitor your Google Postmaster Tools reports regularly, or integrate it with SendForensics to get alerts on your spam rate and other problematic thresholds.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.sendforensics.com/blog/content/images/2023/11/Frame-5-1.jpg" class="kg-image" alt="Understanding Google and Yahoo&apos;s new bulk sender requirements" loading="lazy" width="1348" height="784" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/11/Frame-5-1.jpg 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2023/11/Frame-5-1.jpg 1000w, https://www.sendforensics.com/blog/content/images/2023/11/Frame-5-1.jpg 1348w" sizes="(min-width: 720px) 720px"><figcaption>Monitor your reputation with SendForensics</figcaption></figure><h3 id="3-dont-impersonate-gmail-from-headers"><strong>3. Don&apos;t impersonate Gmail From: headers</strong></h3><p>In February, Google will begin enforcing a DMARC quarantine policy on at least gmail.com and googlemail.com email addresses. So if you send business emails using a @gmail.com email address from a sending system other than Gmail itself, these emails will very likely end up in spam (if they don&apos;t already).</p><p>If you send business emails using a @gmail.com email address, this is one more reason (of many) to switch to your own domain.</p><h3 id="4-if-you-regularly-forward-email-add-arc-headers-to-outgoing-email"><strong>4. If you regularly forward email, add ARC headers to outgoing email</strong></h3><p>This is mostly applicable to receivers such as inbox providers, ISPs and the like, when they forward email to other destinations.</p><p>Authentic Received Chain (ARC) checks the previous email authentication results of forwarded emails. Without it, forwarded emails can result in authentication failures.</p><p>If a forwarded message passes SPF or DKIM authentication, but ARC shows it previously failed authentication, Gmail treats the message as unauthenticated.</p><h3 id="5-comply-with-dmarc-authentication"><strong>5. Comply with DMARC authentication</strong></h3><p>Starting February, DMARC authentication is mandatory if you send over 5,000 emails per day to Gmail accounts and recommended even if you don&apos;t. Messages that aren&apos;t authenticated might be marked as spam or rejected with a<a href="https://support.google.com/a/answer/3726730?sjid=3583091183200210788-AP#5726"> 5.7.26 error</a>.</p><p>While it is possible to implement and monitor DMARC on your own, the easiest way to get started with DMARC is using a tool like <a href="https://www.sendforensics.com/">SendForensics</a>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.sendforensics.com/blog/content/images/2023/11/Screenshot-2023-11-14-at-2.22.33-PM-1.png" class="kg-image" alt="Understanding Google and Yahoo&apos;s new bulk sender requirements" loading="lazy" width="2000" height="1123" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/11/Screenshot-2023-11-14-at-2.22.33-PM-1.png 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2023/11/Screenshot-2023-11-14-at-2.22.33-PM-1.png 1000w, https://www.sendforensics.com/blog/content/images/size/w1600/2023/11/Screenshot-2023-11-14-at-2.22.33-PM-1.png 1600w, https://www.sendforensics.com/blog/content/images/size/w2400/2023/11/Screenshot-2023-11-14-at-2.22.33-PM-1.png 2400w" sizes="(min-width: 720px) 720px"><figcaption>Sample results for DMARC report-processing within SendForensics</figcaption></figure><p>Google only requires DMARC compliance, not a specific policy. <code>p=none</code> is enough to meet this requirement as long as your emails are DMARC compliant (though you should still look at upgrading to <code>p=quarantine</code> or <code>p=reject</code> eventually).</p><p>The topic of DMARC could be several articles on its own. Check out our <a href="https://www.sendforensics.com/blog/beginners-guide-to-dmarc-2023/">beginner&#x2019;s guide to DMARC</a>, or this <a href="https://www.sendforensics.com/blog/how-to-implement-dmarc-step-by-step-guide/">step-by-step guide to implementing DMARC</a>.</p><h3 id="6-make-sure-the-domain-in-your-from-header-is-aligned-with-either-the-spf-or-dkim-domain"><strong>6. Make sure the domain in your From: header is aligned with either the SPF or DKIM domain</strong></h3><p>This is required to pass DMARC alignment and become DMARC compliant. </p><p>While smaller senders technically only need to implement one of SPF or DKIM, this alignment requirement is why we recommend implementing both. If SPF alignment fails for whatever reason, at least you can fall back on DKIM alignment. When using an email service provider, this often means adding a second DKIM signature with your custom domain.</p><h3 id="7-support-one-click-unsubscribe-and-include-a-clearly-visible-unsubscribe-link"><strong>7. Support one-click unsubscribe and include a clearly visible unsubscribe link</strong></h3><p>If you send over 5,000 emails a day to Gmail accounts, marketing messages and subscribed messages <strong>must</strong> support one-click unsubscribe.</p><p>Your email service provider should handle this for you, so contact them for more information. If you manage your own email, add both of these headers in outgoing messages:</p><ul><li><strong>List-Unsubscribe-Post:</strong> List-Unsubscribe=One-Click</li><li><strong>List-Unsubscribe:</strong> &lt;https://acme.com/unsubscribe/example&gt;</li></ul><p>These are <a href="https://datatracker.ietf.org/doc/html/rfc8058">RFC 8058</a> and <a href="https://datatracker.ietf.org/doc/html/rfc2369">RFC 2369</a> respectively.</p><p>Your emails should already include a clear unsubscribe link that leads to a page that makes it easy for recipients to unsubscribe from all mail. </p><p>Some senders use a preferences center to let people choose what kind of messages they want to receive. In this case, you must <em>also</em> separately allow people to unsubscribe from all emails in one step.</p><h2 id="is-there-anything-else-i-have-to-do"><strong>Is there anything else I have to do?</strong></h2><p>Google has published a few other, smaller requirements.</p><ul><li>Format messages according to the Internet Format Standard (<a href="https://datatracker.ietf.org/doc/html/rfc5322">RFC 5322</a>)</li><li>Don&apos;t use HTML and CSS to hide content in your messages</li></ul><p>An email testing platform like SendForensics can highlight issues with these requirements.</p><p>You can see the<a href="https://support.google.com/mail/answer/81126?sjid=3583091183200210788-AP"> full list of requirements</a> on Google support.</p><h2 id="special-considerations-for-email-service-providers"><strong>Special considerations for email service providers</strong></h2><p>If you&apos;re an ESP, you should:</p><ul><li>Provide an email address for reporting email abuse</li><li>Make sure your contact information on your WHOIS record and on abuse.net is current</li><li>Immediate remove any client using your service to send spam</li></ul><p>SendForensics can help you automatically detect clients sending problematic emails before the emails leave your network.<a href="https://www.sendforensics.com/talk-to-sales/"> Contact us here for more information</a>.</p><h2 id="additional-resources"><strong>Additional resources</strong></h2><ul><li><a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/">&quot;New Gmail protections for a safer, less spammy inbox&quot;</a>, Google</li><li><a href="https://support.google.com/mail/answer/81126?sjid=3583091183200210788-AP">&quot;Email sender guidelines&quot;</a>, Google</li><li><a href="https://blog.postmaster.yahooinc.com/post/730172167494483968/more-secure-less-spam">&#x201C;More Secure, Less Spam: Enforcing Email Standards for a Better Experience&#x201D;</a>, Yahoo</li><li><a href="https://senders.yahooinc.com/best-practices/">&#x201C;Sender Best Practices&#x201D;</a>, Yahoo</li><li><a href="https://www.m3aawg.org/blog/SendingBulkMailToGmail_Yahoo">&quot;New minimum requirements for sending bulk email to Gmail and Yahoo&quot;</a>, M3AAWG</li></ul>]]></content:encoded></item><item><title><![CDATA[Reimagining domains and deliverability]]></title><description><![CDATA[Today, we're introducing an improved layout that makes it easier to navigate within the platform and puts your brand at the center of deliverability.]]></description><link>https://www.sendforensics.com/blog/reimagining-domains-and-deliverability/</link><guid isPermaLink="false">650d3375849f60e23a0bfad3</guid><category><![CDATA[Updates]]></category><dc:creator><![CDATA[SendForensics]]></dc:creator><pubDate>Sun, 24 Sep 2023 08:07:15 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2023/09/unmonitored.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2023/09/unmonitored.png" alt="Reimagining domains and deliverability"><p>Today, we&apos;re introducing an improved hierarchical layout with new sender discovery features that puts your domain at the center of deliverability.</p><p>Very few companies are aware of the true extent of their outbound email footprint, like how many different systems are sending from how many different sending domains. But why is it so important?</p><p>A large part of deliverability is your sender reputation: how inbox providers view you as a sender, based on your emails received over time. Sender reputation is made up of both domain and IP-based reputation. In recent years, domain-centric reputation has largely superseded IP reputation. This is because IPs are easy to change, but your brand&#x2019;s primary domain is not.</p><h2 id="the-challenge-with-domains">The challenge with domains</h2><p>All websites start with the primary domain. This is the main URL for your website, like acme.com. This could also be the only domain used for email, or one of many:</p><ul><li>You might use Microsoft 365 for your business email, sending from acme.com</li><li>You might use Salesforce for your CRM, also sending from acme.com</li><li>You might use Zendesk for customer support, sending emails from helpdesk.acme.com</li><li>You might use Mailchimp for marketing campaigns, sending from offers.acme.com</li><li>Transactional emails like order receipts and alerts could be sent from notifications.acme.comx</li></ul><p>Collectively, these are called sending domains: any domain you send an email from.</p><p>Many businesses use subdomains to isolate email activity and prevent reputation problems from cascading. The theory goes that if something goes wrong with your marketing subdomain, you don&apos;t want it to block critical transactional emails like password resets from sending.</p><p>Subdomains <em>can</em> mitigate against potential damage, but it is not foolproof &#x2014; if it were, spammers would just use new subdomains. If too many subdomains have a bad reputation, your primary domain will be impacted.</p><p><em>&#x201C;The risk is that &quot;maindomain.com&quot; may get filtered if too many subdomains look bad, but that needs to be a risk you accept and manage by maintaining the reputation of all subdomains.&#x201D; &#xA0;</em><a href="https://web.archive.org/web/20151126050837/http://www.magillreport.com/Spamhaus-Provides-Answers-Part-Four">via Spamhaus</a></p><p>As your business grows, you&apos;ll likely end up with lots of domains. Some common scenarios:</p><ul><li>A domain for each country: acme.com, acme.fr, acme.br...</li><li>A subdomain for each email activity: news.acme.com, help.acme.com...</li><li>A combination of both: acme.com + secure.acme.com, acme.com + ensecurite.acme.fr</li></ul><p>This heady mixture of sending systems, domains and subdomains simultaneously hold their own reputation, contribute to each others&#x2019;, and impact the overall reputation of the primary domain.</p><p>The more complex your domain tree, the harder it is to measure and test deliverability, as no sending domain or sending system should be left out.</p><h2 id="sendforensics-new-layout">SendForensics&apos; new layout</h2><p>Our improved navigation focuses on the primary domain as a first-order principle. To reflect the impact each sending domain has on overall deliverability as well as its own, all sending domains are shown within a primary domain.</p><p>Each SendForensics account can have multiple primary domains:</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/blog/content/images/2023/09/signal-2023-09-25-130039_002.png" class="kg-image" alt="Reimagining domains and deliverability" loading="lazy" width="1519" height="583" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/09/signal-2023-09-25-130039_002.png 600w, https://www.sendforensics.com/blog/content/images/size/w1000/2023/09/signal-2023-09-25-130039_002.png 1000w, https://www.sendforensics.com/blog/content/images/2023/09/signal-2023-09-25-130039_002.png 1519w" sizes="(min-width: 720px) 720px"></figure><p>And each primary domain can have multiple sending domains:</p><figure class="kg-card kg-image-card"><img src="https://lh4.googleusercontent.com/texr-wE7Z6Tasf7hp6ZsKgC2GcnWC1URhtkqMXLxkLy-yf8gXFTpXKjAMYNPwpWCkUjwBYpRQi6WiYqrxLAuR1jtA5FjiMsFQ3CitkgbrqyWccyLDk4XbBYeUE3AzbPnHptnntcYzXs_u4ifsv4h2Q4" class="kg-image" alt="Reimagining domains and deliverability" loading="lazy"></figure><p>This is a more accurate reflection of how deliverability works across primary domains and sending domains.</p><h2 id="get-started">Get started</h2><p>To get started, simply <a href="https://www.sendforensics.com/login/">log in to SendForensics</a> or <a href="https://www.sendforensics.com/signup/trial/">sign up for a trial</a>. You&apos;ll see the new look immediately, as well as any automatically identified domains.<br></p>]]></content:encoded></item><item><title><![CDATA[How to Implement DMARC (Step-by-step Guide)]]></title><description><![CDATA[Not sure how to set up DMARC? Follow this step-by-step guide to upload a basic DMARC policy and start receiving aggregate reports.]]></description><link>https://www.sendforensics.com/blog/how-to-implement-dmarc-step-by-step-guide/</link><guid isPermaLink="false">6555b4f4849f60e23a0bfd15</guid><category><![CDATA[Security & Authentication]]></category><category><![CDATA[Tutorials]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Wed, 09 Aug 2023 13:02:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2023/11/dmarc.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2023/11/dmarc.jpg" alt="How to Implement DMARC (Step-by-step Guide)"><p>In this tutorial, you&apos;ll be editing your domain&apos;s DNS records to add a DMARC record. Before you start, make sure you have either SPF or DKIM set up and passing. DMARC will not work without at least one of these.</p><p>You&apos;ll also need access to your domain&apos;s DNS, which is usually provided by your registrar (like Godaddy or Google Domains).</p><h2 id="step-1-add-a-dmarc-record-to-your-dns">Step 1. Add a DMARC record to your DNS</h2><p>The record we usually recommend starting with has a &quot;monitor&quot; policy.</p><p><code>v=DMARC1; p=none; rua=mailto:[reportingemail@yourdomain.com]</code></p><p>This has a <code>p=none</code> policy, so emails won&apos;t be rejected or sent to spam if DMARC fails. All it does is forward <code>rua</code> reports to your email address. You may also find that simply adding a DMARC record achieves DMARC compliance for your emails, if either SPF or DKIM have been set up correctly.</p><p>Within your domain&apos;s DNS, add the following DNS TXT record:</p><!--kg-card-begin: html--><table>
<thead>
<tr>
<th>Hostname</th>
<th>TTL</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>_dmarc.yourdomain.com</code></td>
<td>[lowest available]</td>
<td><code>v=DMARC1; p=none; rua=mailto:[reportingemail@yourdomain.com]</code></td>
</tr>
</tbody>
</table><!--kg-card-end: html--><p>Replace [reportingemail@yourdomain.com] with the email you want DMARC reports to be sent to. We recommend setting up a separate inbox for this (like <a>dmarc@yourdomain.com</a>) so your primary email doesn&apos;t get flooded with reports.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">&#x1F4A1;</div><div class="kg-callout-text">If you&apos;re using SendForensics, replace the [reportingemail@yourdomain.com] with your SendForensics rua address.</div></div><p>Reports can also be sent to multiple emails with a comma separator:</p><pre><code>rua=mailto:rua-import-xxx@sendforensics.com,mailto:hey@mydomain.com
</code></pre><p>Note that if the email receiving reports is on a different domain, an additional DMARC authorization record needs to be in place within that external domain&apos;s DNS.</p><p>You can also add a <code>ruf</code> reporting address for individual forensic reports, but most people don&apos;t need this.</p><h2 id="step-2-check-your-dmarc-reports">Step 2. Check your DMARC reports</h2><p>It can take up to 48 hours for DNS to propagate and to start receiving aggregate reports. Reports are usually sent daily, though this varies by provider.</p><p>DMARC reports are sent as raw XML files. You can use a DMARC monitoring tool like SendForensics, or read them yourself.</p><pre><code class="language-xml">&lt;record&gt;
	&lt;row&gt;
		&lt;source_ip&gt;203.0.113.209&lt;/source_ip&gt;
			&lt;count&gt;2&lt;/count&gt;
		&lt;policy_evaluated&gt;
			&lt;disposition&gt;none&lt;/disposition&gt;
			&lt;dkim&gt;pass&lt;/dkim&gt;
			&lt;spf&gt;pass&lt;/spf&gt;
		&lt;/policy_evaluated&gt;
	&lt;/row&gt;
	&lt;identifiers&gt;
		&lt;header_from&gt;mydomain.com&lt;/header_from&gt;
	&lt;/identifiers&gt;
	&lt;auth_results&gt;
		&lt;dkim&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;pass&lt;/result&gt;
			&lt;human_result&gt;&lt;/human_result&gt;
			&lt;/dkim&gt;
		&lt;spf&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;pass&lt;/result&gt;
		&lt;/spf&gt;
	&lt;/auth_results&gt;
&lt;/record&gt;</code></pre><p>Verify authentication results are <code>pass</code>:</p><pre><code class="language-xml">&lt;auth_results&gt;
		&lt;dkim&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;pass&lt;/result&gt;
		&lt;/dkim&gt;
		&lt;spf&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;pass&lt;/result&gt;
		&lt;/spf&gt;
&lt;/auth_results&gt; </code></pre><p>Check alignment by matching the <code>domain</code> with the <code>header_from</code>.</p><pre><code class="language-xml">&lt;identifiers&gt;
  &lt;header_from&gt;mydomain.com&lt;/header_from&gt;
&lt;/identifiers&gt;</code></pre><p>DMARC will pass if <em>either</em>:</p><p>SPF passes and the SPF domain matches the header_from domain, <em>or</em></p><p>DKIM passes and the DKIM domain matches the header_from domain</p><h2 id="step-3-fix-dmarc-failures">Step 3. Fix DMARC failures</h2><p>DMARC fails when neither SPF nor DKIM is <em>aligned</em>. It doesn&apos;t matter if SPF/DKIM passed individually - one of them must <em>also</em> align (their domain matches with the <code>header_from</code>).</p><p>Only move on to the next step when you&apos;ve confirmed:</p><ol><li>You&apos;re receiving aggregate reports on schedule</li><li>DMARC is passing consistently across all your sending systems using that domain (marketing, business email, transactionals etc)</li></ol><h2 id="step-4-enforce-dmarc">Step 4. Enforce DMARC</h2><p>Once you&apos;re confident DMARC is passing consistently for all your sending systems using the domain, you can start enforcing a stricter policy and instructing receiving servers what to do with emails that fail.</p><p>From here, your specific policy depends on how aggressive you want to be. We usually recommend a phased approach; initially using <code>quarantine</code> to minimise any accidental loss of legitimate email, monitoring again for a period, then moving to a stricter <code>reject</code> policy which protects against spoofing better.</p><p>Some organizations have dedicated subdomains for specific email channels/sending-systems, like <code>e.economist.com</code> or <code>notif.salesforce.com</code>. If you have a dedicated subdomain like this, always send from the same provider, and the subdomain has its own DMARC record, then moving to a <code>reject</code> policy is low risk.</p><p>You can also start adding the optional tags to customize DMARC enforcement. Common ones are <code>pct</code> for the percentage of failed emails the policy should apply to, <code>adkim</code> and <code>aspf</code> for stricter alignment (default is relaxed), and <code>ruf</code> if you want forensic reports.</p><div class="kg-card kg-callout-card kg-callout-card-yellow"><div class="kg-callout-emoji">?</div><div class="kg-callout-text">By default, subdomains inherit the parent domain&apos;s DMARC policy. You can specify a separate policy for all subdomains in the parent domain&apos;s record using the <code>sp</code> tag, or override any inheritance completely by adding a separate DMARC record for each subdomain.</div></div>]]></content:encoded></item><item><title><![CDATA[Beginner's Guide to DMARC (2023)]]></title><description><![CDATA[DMARC secures your email from spoofing. Learn how DMARC works with example policies and reports from Stripe and Amazon.]]></description><link>https://www.sendforensics.com/blog/beginners-guide-to-dmarc-2023/</link><guid isPermaLink="false">655456f0849f60e23a0bfb76</guid><category><![CDATA[Security & Authentication]]></category><category><![CDATA[Tutorials]]></category><dc:creator><![CDATA[Dee Mirai]]></dc:creator><pubDate>Mon, 12 Jun 2023 13:01:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2023/11/image--1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2023/11/image--1-.png" alt="Beginner&apos;s Guide to DMARC (2023)"><p>In 2010, engineers from 17 organizations (including Google, Paypal, LinkedIn, and Microsoft) met to discuss combating spam, especially the increasing spoofing/counterfeit varieties, at scale. After several drafts, DMARC was released in 2015 as <a href="https://datatracker.ietf.org/doc/html/rfc7489">RFC 7489</a>.</p><p>Uptake was slow, like it usually is with new standards. However, by 2021, there were nearly 5 million valid DMARC policies.</p><h2 id="what-is-dmarc">What is DMARC?</h2><p>DMARC (technically Domain-based Message Authentication, Reporting, and Conformance, but that&apos;s a mouthful) extends the existing SPF and DKIM standards. At its core, DMARC is two things in one:</p><ol><li>It&apos;s an email authentication protocol that verifies emails are actually coming from the domain they claim to be coming from</li><li>It&apos;s a reporting system that tells you when your emails fail DMARC authentication (in other words: they might be spoofed)</li></ol><h2 id="why-do-you-need-dmarc">Why do you need DMARC?</h2><p>In 2013, Facebook and Googles employees received an invoice from Quanta Computer, a Taiwan-based computer hardware manufacturer. The invoices seemed normal &#x2014; they&apos;d done business with Quanta Computer before &#x2014; so they transferred the amount due and moved on.</p><p>Except the invoices didn&apos;t exist. These emails weren&apos;t from Quanta Computer at all, but a spoofer named Evaldas Rimasauskas. His fake emails looked like they came from legitimate Quanta employees. Facebook and Google lost over $100 million before the scam was found.</p><p>In this attack, the only affected parties were Facebook and Google. That&apos;s not always true.</p><p>The 2017 Amazon Locky attack targeted Amazon customers by spoofing real shipping updates sent from <a>auto-shipping@amazon.com</a>. The only content in the email was a Microsoft Word file. Anybody who downloaded it would find their device locked with a $250-$500 ransom.</p><p>DMARC&apos;s primary purpose is to stop people from spoofing your email address. However, by raising the level of trust in emails from your domain, it also indirectly helps your email deliverability. Properly configured SPF/DKIM and DMARC records are signals of good sender behavior, and can improve your sender reputation.</p><h2 id="how-does-dmarc-work">How does DMARC work?</h2><p>Unlike SPF and DKIM, which are both self-contained, DMARC has to piggyback off either SPF or DKIM for it to function.</p><p>A DMARC test will pass if <em>either</em> SPF or DKIM passes <em>and</em> that pass is <em>aligned</em>.</p><p>DMARC enforces <em>alignment</em> between either the SMTP <code>MAIL FROM</code> domain (SPF domain) and the <code>FROM</code> header domain, <em>or</em> the domain on a DKIM signature and the <code>FROM</code> header domain. In both cases, think of the <code>FROM</code> header domain as the anchor.</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://www.sendforensics.com/blog/content/images/2023/11/About-DMARC2.001-1.png" class="kg-image" alt="Beginner&apos;s Guide to DMARC (2023)" loading="lazy" width="946" height="582" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2023/11/About-DMARC2.001-1.png 600w, https://www.sendforensics.com/blog/content/images/2023/11/About-DMARC2.001-1.png 946w"><figcaption>Some DMARC authentication examples</figcaption></figure><p>If the email passes the receiving server&apos;s DMARC test, it&apos;s a big tick for that email&apos;s trust profile and it&apos;ll likely be treated favourably.</p><p>If the email fails the DMARC test, the receiving server looks at the domain&apos;s DMARC record to help it decide what to do with the failed email. The policy tag in that record tells it to either do nothing, quarantine the email, or reject it completely. It may also ignore the tag completely and do its own thing, but that particular behaviour is in the minority.</p><p>If there is a reporting address in the DMARC record, the receiving server also sends a report of the email transaction as an aggregate (rua) DMARC report. </p><h2 id="what-does-a-dmarc-record-look-like">What does a DMARC record look like?</h2><p>Let&apos;s look at the DMARC record for <a href="http://stripe.com">Stripe</a> for example. You can see it for yourself by doing a standard DNS lookup of &#xA0;<code>_dmarc.stripe.com</code>:</p><pre><code>v=DMARC1; p=reject; rua=mailto:dmarc-reports@stripe.com; ruf=mailto:dmarc-forensics@stripe.com
</code></pre><p>We&apos;ll break down each component in this record.</p><p><code>v=DMARC1</code></p><p>This is the DMARC version and serves as an identifier to receiving servers. It&apos;s a required tag, and if it&apos;s missing or incorrect, the DMARC test will be skipped.</p><p><code>p=reject</code></p><p>Stripe has decided to implement a reject policy, instructing receiving servers to reject all emails that fail DMARC. Some servers may ignore this instruction, but most will follow it.</p><p><code>rua=mailto:dmarc-reports@stripe.com</code></p><p>Email providers send aggregated reports to this address about all emails they&apos;ve received from Stripe&apos;s domain. The reports are high-level and anonymized, containing no personally identifiable information.</p><p>For privacy reasons, most DMARC monitoring tools (including SendForensics) will only accept <code>rua</code> reports.</p><p><code>ruf=mailto:dmarc-forensics@stripe.com</code></p><p>Stripe also has a different email address for forensic reports. These are individual forensic failure reports that will be sent in real-time, including specific details about the failure.</p><h3 id="optional-dmarc-tags">Optional DMARC tags</h3><p>There&apos;s a number of optional DMARC tags you can use to fine-tune your policy.</p><!--kg-card-begin: html--><table>
<thead>
<tr>
<th>Tag</th>
<th>Meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td>pct</td>
<td>The percentage of failed emails that the set policy should apply to. For example, if you choose to &#x2018;quarantine&#x2019; 10% of emails, the other 90% would be treated as though a &#x2018;none&#x2019; policy was applied. The value should be a number between 1 and 100.</td>
</tr>
<tr>
<td>sp</td>
<td>The specific policy for emails sent from subdomains. You could choose to ignore failed emails sent from the main domain (p=&#x2019;none&#x2019;) but quarantine those sent from subdomains (sp=&#x2019;quarantine&#x2019;). Subdomains with their own separate DMARC record are not affected.</td>
</tr>
<tr>
<td>adkim</td>
<td>Decide how strict DMARC should be when comparing the sender&#x2019;s domain against DKIM&#x2019;s &#x2018;d&#x2019; tag. Possible options are &#x2018;strict&#x2019; and &#x2018;relaxed&#x2019;. By default, the approach is &#x2018;relaxed&#x2019;. Typically, &apos;strict&apos; means that subdomain matches are not accepted.</td>
</tr>
<tr>
<td>aspf</td>
<td>The same choice, but for SPF alignment. Decide whether SPF should aim for a perfect match of &#x201C;envelope from&#x2019; domain and &#x201C;return-path&#x201D; address or if subdomains of &#x201C;envelope from&#x201D; domain should be also allowed. Again, you can choose between &#x2018;strict&#x2019; or &#x2018;relaxed&#x2019;.</td>
</tr>
<tr>
<td>ri</td>
<td>Sets the intervals for how often you want to receive aggregate reports (&#x2018;rua&#x2019; tag). The value is expressed in seconds, by default it&#x2019;s 86400 (every 24 hours). Report-sending ISPs can however set their own sending schedule.</td>
</tr>
<tr>
<td>fo</td>
<td>Choose when to receive forensics reports (&#x2018;ruf&#x2019;). Possible options are &#x2018;0&#x2019; (SPF and DKIM failed), &#x2018;1&#x2019; (SPF, DKIM, or DMARC failed), &#x2018;d&#x2019; (DKIM failed), and &#x2018;s&#x2019; (SPF failed). By default, it&#x2019;s &#x2018;0&#x2019;.</td>
</tr>
</tbody>
</table><!--kg-card-end: html--><p>Stripe&apos;s full DMARC policy contains two of these optional tags: <code>pct=100</code>, meaning 100% of failing emails should be rejected (the default setting i.e. this tag can also be left out of the record), and <code>fo=1</code>, meaning to send a forensic report if any test (SPF, DKIM, or DMARC) fails.</p><pre><code>`v=DMARC1; p=reject; pct=100; fo=1; rua=mailto:dmarc-reports@stripe.com; ruf=mailto:dmarc-forensics@stripe.com`
</code></pre><p>Here&apos;s another example to understand the different tags.</p><pre><code>v=DMARC1;p=quarantine;pct=100;rua=mailto:report@dmarc.amazon.com;ruf=mailto:report@dmarc.amazon.com
</code></pre><p>Unlike Stripe, Amazon instructs servers to quarantine emails and send them to spam. This applies to 100% of emails. They also have both a <code>rua</code> address and a <code>ruf</code> address.</p><h2 id="how-to-read-dmarc-reports">How to read DMARC reports</h2><p>Securing emails with DMARC is only half the battle. The other half is analyzing the data in the reports you get back.</p><p>Raw DMARC reports contain report metadata and at least one record. Unfortunately, they&apos;re also in XML format. I&apos;m really sorry. I didn&apos;t come up with it.</p><p>Here&apos;s an example aggregate report:</p><pre><code class="language-xml">&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot; ?&gt;
&lt;feedback&gt;
	&lt;report_metadata&gt;
		&lt;org_name&gt;solarmora.com&lt;/org_name&gt;
		&lt;email&gt;noreply-dmarc-support@solarmora.com&lt;/email&gt;
		&lt;report_id&gt;9391651994964116463&lt;/report_id&gt;
		&lt;date_range&gt;
			&lt;begin&gt;1335571200&lt;/begin&gt;
			&lt;end&gt;1335657599&lt;/end&gt;
		&lt;/date_range&gt;
	&lt;/report_metadata&gt;
	&lt;policy_published&gt;
		&lt;domain&gt;mydomain.com&lt;/domain&gt;
		&lt;adkim&gt;r&lt;/adkim&gt;
		&lt;aspf&gt;r&lt;/aspf&gt;
		&lt;p&gt;none&lt;/p&gt;
		&lt;sp&gt;none&lt;/sp&gt;
		&lt;pct&gt;100&lt;/pct&gt;
	&lt;/policy_published&gt;
	&lt;record&gt;
		&lt;row&gt;
			&lt;source_ip&gt;203.0.113.209&lt;/source_ip&gt;
			&lt;count&gt;2&lt;/count&gt;
			&lt;policy_evaluated&gt;
			&lt;disposition&gt;none&lt;/disposition&gt;
			&lt;dkim&gt;fail&lt;/dkim&gt;
			&lt;spf&gt;pass&lt;/spf&gt;
			&lt;/policy_evaluated&gt;
		&lt;/row&gt;
		&lt;identifiers&gt;
			&lt;header_from&gt;mydomain.com&lt;/header_from&gt;
		&lt;/identifiers&gt;
		&lt;auth_results&gt;
			&lt;dkim&gt;
				&lt;domain&gt;mydomain.com&lt;/domain&gt;
				&lt;result&gt;fail&lt;/result&gt;
				&lt;human_result&gt;&lt;/human_result&gt;
			&lt;/dkim&gt;
			&lt;spf&gt;
				&lt;domain&gt;mydomain.com&lt;/domain&gt;
				&lt;result&gt;pass&lt;/result&gt;
			&lt;/spf&gt;
		&lt;/auth_results&gt;
	&lt;/record&gt;
&lt;/feedback&gt;</code></pre><p>Let&apos;s break this down.</p><pre><code class="language-xml">&lt;report_metadata&gt;
	&lt;org_name&gt;solarmora.com&lt;/org_name&gt;
	&lt;email&gt;noreply-dmarc-support@solarmora.com&lt;/email&gt;
	&lt;report_id&gt;9391651994964116463&lt;/report_id&gt;
	&lt;date_range&gt;
		&lt;begin&gt;1335571200&lt;/begin&gt;
		&lt;end&gt;1335657599&lt;/end&gt;
	&lt;/date_range&gt;
&lt;/report_metadata&gt;</code></pre><p>This is the metadata of the report. The <code>&lt;org_name&gt;</code> contains the name of the ISP that received the email and is sending the DMARC report. The date ranges are in Unix time &#x2014; use <a href="https://unixtime.org">this converter</a> to see the &quot;human&quot; date.</p><pre><code class="language-xml">&lt;policy_published&gt;
	&lt;domain&gt;mydomain.com&lt;/domain&gt;
	&lt;adkim&gt;r&lt;/adkim&gt;
	&lt;aspf&gt;r&lt;/aspf&gt;
	&lt;p&gt;quarantine&lt;/p&gt;
	&lt;sp&gt;none&lt;/sp&gt;
	&lt;pct&gt;100&lt;/pct&gt;
&lt;/policy_published&gt;</code></pre><p>This is the DMARC policy your domain is using at the time of the report. If you&apos;ve recently changed your DMARC policy, this is useful for filtering reports.</p><pre><code class="language-xml">&lt;record&gt;
	&lt;row&gt;
		&lt;source_ip&gt;203.0.113.209&lt;/source_ip&gt;
		&lt;count&gt;2&lt;/count&gt;
		&lt;policy_evaluated&gt;
		&lt;disposition&gt;none&lt;/disposition&gt;
		&lt;dkim&gt;fail&lt;/dkim&gt;
		&lt;spf&gt;pass&lt;/spf&gt;
		&lt;/policy_evaluated&gt;
	&lt;/row&gt;
	&lt;identifiers&gt;
		&lt;header_from&gt;mydomain.com&lt;/header_from&gt;
	&lt;/identifiers&gt;
	&lt;auth_results&gt;
		&lt;dkim&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;fail&lt;/result&gt;
			&lt;human_result&gt;&lt;/human_result&gt;
		&lt;/dkim&gt;
		&lt;spf&gt;
			&lt;domain&gt;mydomain.com&lt;/domain&gt;
			&lt;result&gt;pass&lt;/result&gt;
		&lt;/spf&gt;
	&lt;/auth_results&gt;
&lt;/record&gt;</code></pre><p>Now here&apos;s the fun bit: the <code>&lt;record&gt;</code> and its <code>&lt;auth_results&gt;</code>. This record shows the results for 2 emails received from &apos;mydomain.com&apos;. DKIM has failed, but SPF is passing and the SPF domain is <em>aligned</em> with the <code>&lt;header_from&gt;</code> domain (the sending-domain) so DMARC is passing.</p><p>If you send more than a few emails, you&apos;ll probably want an easier way to see your DMARC results than in raw XML. You can import it into <a href="https://support.microsoft.com/en-us/office/import-xml-data-6eca3906-d6c9-4f0d-b911-c736da817fa4">Microsoft Excel</a>, or use a tool like SendForensics to process it for you.</p><h2 id="key-takeaways">Key takeaways</h2><ul><li>DMARC needs either SPF <em>or</em> DKIM to work, but you should use both for better email security, redundancy and, ultimately, deliverability.</li><li>There are two types of DMARC reports: aggregate (rua) containing all sending data, and forensic (ruf) representing individual emails. ISPs are more reluctant to send ruf reports in this new era of GDPR, CCPA et al, given the PII (personally identifiable information) they can contain. However, most support aggregate reports.</li><li>DMARC aggregate reports are in XML format. You&apos;ll need to convert them to a readable format.</li></ul>]]></content:encoded></item><item><title><![CDATA[SendForensics Integrates Google Postmaster Tools Data]]></title><description><![CDATA[SendForensics integrates Google Postmaster Tools data into its Email Deliverability Suite via the long-awaited (and much appreciated) Postmaster Tools API Beta.]]></description><link>https://www.sendforensics.com/blog/sendforensics-integrates-google-postmaster-tools-data/</link><guid isPermaLink="false">62fafec3539a030ca1a7e6a4</guid><category><![CDATA[Updates]]></category><dc:creator><![CDATA[SendForensics]]></dc:creator><pubDate>Thu, 03 Sep 2020 07:39:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/pawel-czerwinski-fpZZEV0uQwA-unsplash.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/pawel-czerwinski-fpZZEV0uQwA-unsplash.jpg" alt="SendForensics Integrates Google Postmaster Tools Data"><p><strong><strong>Singapore, 3rd September 2020</strong></strong> - SendForensics integrates Google Postmaster Tools data into its Email Deliverability Suite via the long-awaited (and much appreciated) Postmaster Tools API Beta.</p><p>As the world&apos;s most popular email domain, Gmail forms the bulk of most B2C contact lists, and with the rising popularity of own-domain GSuite implementations, increasingly B2B lists too.</p><p>Now legitimate senders can ensure they maintain a good reputational relationship with Google and reach their audiences at Gmail/Gsuite addresses effectively, with Google Postmaster data processed, analysed and displayed directly within the SendForensics platform.</p><p>As part of the new Reputation Dashboard, senders&#x2019; domain/IP reputation, delivery errors, complaint rates and other Postmaster data is combined with additional reputational feeds, ESP engagement data, and standalone email analysis data, to render the complete deliverability picture.</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/images/features/reputation-dashboard.png" class="kg-image" alt="SendForensics Integrates Google Postmaster Tools Data" loading="lazy"></figure><p>For more information, visit <a href="https://www.sendforensics.com/email-deliverability-overview">https://www.sendforensics.com/email-deliverability-overview</a></p><h4 id="about-sendforensics"><strong>About SendForensics:</strong></h4><p>Founded and headquartered in Singapore, SendForensics is a global provider of advanced email security, deliverability &amp; compliance solutions. Reduce risk, restore trust, and safeguard your brand with SendForensics. Trusted by responsible senders worldwide.</p><p><strong><strong>Please note:</strong></strong> SendForensics is an independent deliverability company and the ability to connect to and process this API in no way implies an endorsement of SendForensics by Google. This connection is provided for the convenience of our users under the terms and conditions of their respective Postmaster Tools agreements. All product names, trademarks and registered trademarks are the property of their respective owners.</p>]]></content:encoded></item><item><title><![CDATA[How to send emails through a VPN]]></title><description><![CDATA[If you run your own company mailserver, you might find that emails sent suffer unexpected deliverability issues. Here's a brief guide to using a VPN.]]></description><link>https://www.sendforensics.com/blog/sending-email-through-a-vpn/</link><guid isPermaLink="false">62fafec3539a030ca1a7e6a2</guid><category><![CDATA[Security & Authentication]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Mon, 24 Sep 2018 00:00:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/petter-lagson-NEtFkKuo7VY-unsplash.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/petter-lagson-NEtFkKuo7VY-unsplash.jpg" alt="How to send emails through a VPN"><p>When you send an email from your device using an email client (e.g. Outlook, Apple Mail, Thunderbird etc.) and a standard POP3/IMAP mailbox, the email&#x2019;s journey will look something like this:</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/blog/content/images/2022/08/image-1.png" class="kg-image" alt="How to send emails through a VPN" loading="lazy" width="639" height="116" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2022/08/image-1.png 600w, https://www.sendforensics.com/blog/content/images/2022/08/image-1.png 639w"></figure><p>When it&#x2019;s received by the recipient&#x2019;s mailserver (M2), the details of both the hop from A &#x2014;&gt; M1, and the hop from M1 &#x2014;&gt; M2 will be present in the header of the email ..and this will be scrutinised by M2&#x2019;s spam-filtering system.</p><p>Let&#x2019;s take a look at what those &#x201C;Received: from&#x201D; headers might look like, sending from a laptop in a typical office environment to a Gmail address. Note that when reading an email&apos;s headers (view headers/source in most mail programs), the route is in reverse i.e. the first hop is the first &#x201C;Received: from&#x201D; line, reading <em>from the bottom-up</em>.</p><h3 id="am1">A -&gt; M1</h3><figure class="kg-card kg-code-card"><pre><code>Received: from [10.0.1.5] (mainoffice.companydomain.com [214.85.314.321]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailserver.companydomain.com (Postfix) with ESMTPSA id 3D46C41B1E for &lt;recipient@gmail.com&gt;; Wed, 12 Sep 2018 08:59:20 +0000 (UTC)</code></pre><figcaption>NOTE: I am using non-existent IP addresses in the examples throughout this article.</figcaption></figure><p>This laptop has been assigned the IP address 10.0.1.5 by the office internal network, and the email is being sent through the office&apos;s internet-facing dedicated IP 214.85.314.321 (provided by its ISP), which has been set to have the hostname mainoffice.companydomain.com. This hostname when looked-up resolves back to the IP 214.85.314.321, so everything checks out and there&apos;s no IP blacklisting (hopefully!).</p><h3 id="m1m2">M1 -&gt; M2</h3><pre><code>Received: from mailserver.companydomain.com (mailserver.companydomain.com. [132.426.34.45]) by mx.google.com with ESMTPS id s20-v6si492286pgk.87.2018.09.12.01.59.23 for &lt;recipient@gmail.com&gt; (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 12 Sep 2018 01:59:23 -0700 (PDT)</code></pre><p>It is received by the company mailserver which then delivers it to the Gmail receiving mailserver - all good here.</p><p>Now, what might happen to the first hop when you&#x2019;re out and about:</p><h3 id="am1-1">A -&gt; M1</h3><pre><code>Received: from [10.124.184.56] (amx-tls3.starhub.net.sg [203.116.164.13]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailserver.companydomain.com (Postfix) with ESMTPSA id 174CD415EA for &lt;recipient@gmail.com&gt;; Fri, 7 Sep 2018 05:39:38 +0000 (UTC)</code></pre><p>Here, my mobile phone has been given the IP address 10.124.184.56 by the telco&apos;s 4G network, but the important one here is the telco&apos;s server amx-tls3.starhub.net.sg with IP 203.116.164.13. This is in pretty good shape since a lookup on the hostname amx-tls3.starhub.net.sg points to 203.116.164.13, and a reverse DNS lookup on the IP points to the hostname. Therefore forward-confirmed reverse DNS (FCrDNS) checks out; this is a weak but useful form of authentication which receiving mailservers use to help determine whether a sender is legitimate or not. However, the public IP 203.116.164.13 was on two major blacklists at the time of send, marring the receiving server&apos;s assessment of the legitimacy of the sender - not good.</p><p>It can get worse though...</p><h3 id="am1-2">A -&gt; M1</h3><pre><code>Received: from [10.124.117.97] (unknown [134.215.314.24]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailserver.companydomain.com (Postfix) with ESMTPSA id 204DB144BA for &lt;recipient@gmail.com&gt;; Fri, 04 Sep 2018 05:39:38 +0000 (UTC)
</code></pre><p>This is an example of sending over a network with no server hostname at all, let alone a fully qualified domain name (FQDN). FCrDNS is therefore broken, the receiving server sees an unknown sender in the chain, AND the IP is on several blacklists.</p><p>This last example is actually what is often seen when sending through a regular shared-IP VPN, since anonymity can be one of the goals of VPN usage for some. Unfortunately, the anonymity provided can encourage more dodgy uses of VPNs, leading to IP blacklisting for the shared IPs.</p><div class="kg-card kg-callout-card kg-callout-card-yellow"><div class="kg-callout-emoji">?</div><div class="kg-callout-text">Aside from security over open/unknown networks, another key reason people turn to VPNs is to provide anonymous browsing. When you browse through a regular shared-IP VPN, you can usually choose from a range of server locations with anonymous IPs to use. These IP addresses may be different every time, plus they are also likely shared by as many as tens of thousands of other users, making tracing your movements online even harder.</div></div><h2 id="how-to-achieve-a-reputable-sending-infrastructure-remotely">How to achieve a reputable sending infrastructure remotely</h2><p>Two things are needed:</p><ul><li>Control over the reputation of your IP</li><li>A resolvable hostname and corresponding PTR record for the IP so that FCrDNS checks out</li></ul><p>This is achievable by using a VPN with a dedicated IP, that also allows setting a PTR record for that IP.</p><h2 id="step-1-get-a-compatible-vpn">Step 1: Get a compatible VPN</h2><p>It needs to be able to support the following:</p><ul><li>dedicated IP</li><li>custom PTR record for that IP</li><li>port 465 or 587 open (for secure SMTP)*</li></ul><p>*preferably port 587, since 465 has officially been deprecated (although still largely supported)</p><h2 id="step-2-set-up-an-a-record">Step 2: Set up an A record</h2><p>Within your company DNS, set up an A record for an unused company subdomain that points to your new VPN dedicated IP. </p><p>For example:</p><p><code>subdomain.companydomain.com &#xA0; 3600 &#xA0; IN &#xA0; A &#xA0; 213.312.21.52</code></p><h2 id="step-3-set-up-a-ptr-record">Step 3: Set up a PTR record</h2><p>Request a PTR record be setup for that IP from the VPN provider that resolves to the subdomain above. The request would look something like:</p><p>&quot;Please could you add a PTR record for our dedicated IP (213.312.21.52) that points to subdomain.companydomain.com&quot;.</p><p>That&apos;s it!</p><p>Once all of this is in place and resolving correctly, you should now see something like this in the first hop when you send:</p><h3 id="am1-3">A -&gt; M1</h3><pre><code>Received: from [213.312.21.52] (subdomain.companydomain.com [213.312.21.52]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailserver.companydomain.com (Postfix) with ESMTPSA id 1B8D112C78 for &lt;recipient@gmail.com&gt;; Fri, 17 Aug 2018 04:53:06 +0000 (UTC)</code></pre><p>The VPN hostname is now the custom subdomain.companydomain.com (created as an A record in the company DNS) which points to the VPN&apos;s dedicated IP (213.312.21.52). The IP also resolves back to subdomain.companydomain.com when looked up, so FCrDNS checks out. And since it is not shared with anyone else, the IP can be kept blacklist-free.</p><p>You now have a squeaky-clean, secure setup for sending high-quality email on the move.</p>]]></content:encoded></item><item><title><![CDATA[IEEE Software 200th Issue: Delivering Genuine Emails in an Ocean of Spam]]></title><description><![CDATA[We're very honoured to be featured in IEEE Software Impact Series as their "first column from the tiger economy of Singapore". ]]></description><link>https://www.sendforensics.com/blog/ieee-software-200th-issue-delivering-genuine-emails-in-an-ocean-of-spam/</link><guid isPermaLink="false">62fb051c539a030ca1a7e6ea</guid><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Mon, 24 Jul 2017 02:48:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/c6da935b08f64dbb8c1b2a1e558e0173_30.jpeg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/c6da935b08f64dbb8c1b2a1e558e0173_30.jpeg" alt="IEEE Software 200th Issue: Delivering Genuine Emails in an Ocean of Spam"><p>We&apos;re very honoured to be featured in IEEE Software Impact Series as their &quot;first column from the tiger economy of Singapore&quot;. In it we discuss the issues facing email in 2017, and how they can be resolved by a new approach to legitimate sending.</p><p>There&apos;s also a detailed technical breakdown of the software and distributed platforms used to achieve it (if you&apos;re into it!).</p><p>We&apos;re able to make our article available by PDF download (link below), but please note that the copyright belongs to IEEE Software so it may not be re-distributed without express permission.</p><p>Download the PDF: <a href="https://www.sendforensics.com/kbfiles/SendForensics-IEEE-Software-Article-Aug2017.pdf">IEEE: Delivering Genuine Emails in an Ocean of Spam</a></p><p>On that note, if you are involved in the nuts and bolts of software in any capacity we would highly recommend <a href="https://www.ieee.org/membership-catalog/productdetail/showProductDetailPage.html?product=PER312-ELE">subscribing</a> to what is one of the world&apos;s leading journals for software engineering.</p>]]></content:encoded></item><item><title><![CDATA[DMARC: now is the time]]></title><description><![CDATA[Just 3 years ago, the number of emails sent with DMARC implemented was a small proportion of global email traffic. ]]></description><link>https://www.sendforensics.com/blog/dmarc-now-is-the-time/</link><guid isPermaLink="false">62fafec3539a030ca1a7e6a6</guid><category><![CDATA[Security & Authentication]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Thu, 27 Apr 2017 09:18:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/983510d549c006b2b6ca207730cf338e_26--1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/983510d549c006b2b6ca207730cf338e_26--1-.png" alt="DMARC: now is the time"><p>The DMARC email protocol has been available for several years now. Yet while a powerful tool in email authentication, its voluntary take-up, misunderstood benefits, and the myth of complexity that surrounds it has held it back. 2017, however, is shaping up to be its year.</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/blog/content/images/2022/08/983510d549c006b2b6ca207730cf338e_26.png" class="kg-image" alt="DMARC: now is the time" loading="lazy" width="780" height="394" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2022/08/983510d549c006b2b6ca207730cf338e_26.png 600w, https://www.sendforensics.com/blog/content/images/2022/08/983510d549c006b2b6ca207730cf338e_26.png 780w" sizes="(min-width: 720px) 720px"></figure><p>Just 3 years ago, the number of emails sent with DMARC implemented was a small proportion of global email traffic (fig.1). Part of the reason is that it required both sender and receiver to comply with what was an emergent and voluntary protocol.</p><p>However, 2016 started to see the larger global freemail providers jump on the bandwagon after seeing what it can do to combat the rise of sophisticated spoofed phishing attacks. Now in 2017, we&apos;re experiencing the knock-on effects in the private sector with organisations taking a more pro-active role in protecting their customers, employees and brand; not to mention the added deliverability improvements for marketing and transactional channels.</p><p>It&apos;s not as difficult as one might think to get compliant, and the benefits are huge.</p><p>Now is the time.</p><h2 id="what-is-dmarc">What is DMARC?</h2><p>Very simply, it&#x2019;s another email authentication protocol. However, DMARC&#x2019;s been specifically designed to combat the increasing sophistication and proliferation of email scams/phishing-attacks where an email looks like it has come from a legitimate source, but in fact hasn&#x2019;t.</p><p>Technically-speaking, it is a way for a sender to instruct a receiving server on what action it should take if it cannot validate the sender&#x2019;s From address using either of the other email authentication protocols (SPF/DKIM), for any message sent to it.</p><p>The sender&#x2019;s &#x2018;instructions&#x2019; are present in the sender&#x2019;s DNS records, which the receiver can look up at any time for any message from, <em>or looking like it is from</em>, the sender.</p><p>So, to re-phrase, DMARC is a way to authenticate the often-spoofed From address.</p><h2 id="why-is-it-necessary">Why is it necessary?</h2><p>Spam and Phishing attacks commonly &#x2018;spoof&#x2019; the From address of legitimate companies to fool the user. They will change the From address to something recognisable, which is easily done (whereas the actual email could be coming from anywhere).</p><figure class="kg-card kg-image-card"><img src="https://sf-s3-knowledgebase-images.s3.amazonaws.com/prod/article/e71ec642a956dfb2de9c21bf176478a6_26.png" class="kg-image" alt="DMARC: now is the time" loading="lazy"></figure><p>Legitimate or not? The From address - easily changed by the sender.<br></p><p>SPF and DKIM protocols are already there to combat this by helping to prove the legitimacy of the sender, but what happens if they do not check out (or are not even enabled)? How does the receiving server know whether the sender has simply not set things up properly, or if it is indeed an intentionally spoofed phishing attack from someone else?</p><p>The DMARC records in the sender&#x2019;s DNS are there to help the receiving server to decide what the reality is.</p><h2 id="how-does-it-work">How does it work?</h2><p>When a message is received by a receiving server, it will check whether SPF and DKIM authentications pass or fail, and for which domains (From address, Envelope address etc).</p><p>If DMARC is enabled on the receiving server, it will also look up the DNS records of the from address to see if there is a DMARC policy.</p><p>This policy will contain information as to what it should do if neither of those initial SPF and DKIM authentication checks pass for the From address. They may check out for the other addresses in the email, but there needs to be an SPF or DKIM pass for the From address in order to pass DMARC.</p><p>So, if a sender is confident that they have setup SPF and/or DKIM correctly, they might set the policy to say (in layman&#x2019;s terms):</p><p>&#x201C;If neither SPF and DKIM check-out for our From address, then it&#x2019;s not an email from us. We suggest you quarantine it for further checks of its legitimacy (or even outright discard it).&#x201D;</p><p>An actual DMARC DNS record that does this would look something like this (for the imaginary acmecompany.com domain):</p><p><strong><strong><code>_dmarc.acmecompany.com 60 TXT &quot;v=DMARC1; p=quarantine; rua=mailto:dmarc@acmecompany.com;&quot;</code></strong></strong></p><p>With the following explanations:</p><p><strong><strong><code>_dmarc.acmecompany.com</code></strong></strong><br>Host i.e. the name of the DMARC record and which domain it applies to<br><br><strong><strong>60</strong></strong><br>TTL or Time To Live (how quickly the DNS record updates upon change)<br><br><strong><strong>TXT</strong></strong><br>The type of DNS record. DMARC uses TXT<br><br><strong><strong>v=DMARC1</strong></strong><br>The DMARC version being used - this is mandatory and has to come first<br><br><strong>p=quarantine</strong><br>The DMARC policy for what a receiving-server should do with a failed email (here, it suggests quarantine) - this is also mandatory and has to come after the version<br><br><strong><strong>rua=mailto:dmarc@acmecompany.com</strong></strong><br>The address that DMARC reports should be sent to (more about these below) - this is optional</p><p>There are, of course, many other options and fine-tuning that can be done when you start getting into it; this is simply an overview to illustrate the basics.</p><h2 id="is-it-perfect">Is it perfect?</h2><p>No, but close. There are two instances where it can be either ineffectual or problematic:</p><p><strong><strong>Ineffectual</strong></strong> - if a hijacked computer is used to send phishing email (as part of a botnet, for example) it will pass both SPF and DKIM scrutiny, and also DMARC.</p><p><strong><strong>Problematic</strong></strong> - very occasionally DNS records can be temporarily inaccessible, or there can be a delay in the information returned which can cause a temporary SPF or DKIM error. If the DMARC policy is set to instruct the receiving server to reject on failure (a very strict policy), there is a chance it can reject legitimate email on a temporary SPF or DKIM error. This issue is minimised since DMARC will pass if either SPF or DKIM passes for the From address domain, but there is still the chance of accidental error (which is why we would not recommend the strictest DMARC policy setting).</p><p>The benefits, however, far-outstrip these minor issues.</p><h2 id="dmarc-benefits">DMARC Benefits</h2><h4 id="security"><strong>Security</strong></h4><p>The most compelling benefit for both senders and receivers is DMARC&apos;s ultimate aim: the reduction of successfully-delivered spoofed email.</p><p>For the sender this involves ensuring solid SPF and DKIM implementation and a decent policy in the DMARC DNS record, such as recommending quaratine for any emails failing DMARC checks (although many receiving servers will treat emails that fail their own DMARC policy with suspicion anyway).</p><p>Another considerable security benefit (with Deliverability overlap, as we will see later) is DMARC&apos;s other main feature, which is the reporting of a sender&apos;s DMARC activity across the receiver&apos;s network.</p><p>This takes the form of aggregate (or individual) reports that the sender can request to be sent to it at regular intervals by the receiver. At time of writing, most of the major freemail providers (Google, Outlook et al.) are now set up to produce and send DMARC reports. These contain all the instances of DMARC passes and failures for emails sent to their network from (or purportedly from) the sender, with some extra identifying details (counts, IP addresses, SPF and DKIM authentication results etc).</p><p>This feedback can provide valuable insight about a sender&apos;s management of internal operations and the presence of external domain name abuse.</p><h4 id="deliverability"><strong>Deliverability</strong></h4><p>As with anything that helps prove the legitimacy of an email, there are email deliverability benefits to be had.</p><p>A few years ago these effects were negligible, as the number of receiving servers set up to handle DMARC was a tiny percentage of the overall. However, as can be seen in figure 1. at the top of the article, this is rapidly changing.</p><p>Even with a relaxed DMARC policy, the mere fact that there is one in place that checks out, immediately separates your email out from the hordes of spam. This is especially true for the more commonly-spoofed transactional emails delivering official/business/financial content, or requests for information.</p><p>Running analytics on DMARC report data can also provide the marketer with additional insights into deliverability patterns or unexpected events. For example, a campaign may suddenly experience a significant drop in engagement with a particular provider, with none of the usual causes (high bounce-rate and other list-problems, poor content quality, blacklisting etc).</p><p>It turns out that a rogue IP has been sending thousands of spoofed emails to that provider using your domain as the From address.</p><p>How would you know if it wasn&apos;t for DMARC?</p><h3 id="successful-implementation"><strong>Successful Implementation</strong></h3><p>Enabling DMARC is one of the pro-active steps organisations can take in the protection of their customers, employees and the brand itself. It is also one more tick in the box for successful inbox-placement.</p><p>These days, most senders will already have SPF and DKIM setup correctly (especially if using the services of an ESP). It&apos;s not much of a jump to go from this to the additional benefits of a DMARC &#x2018;pass&#x2019; from a receiving server, involving the addition of a valid DMARC record with a bare-minimum implementation. This alone doesn&#x2019;t take advantage of any of DMARC&#x2019;s reporting capabilities, but will nevertheless demonstrate compliance.</p><p>The next step is setting-up a policy for instructing receiving servers on what to do with email that isn&apos;t coming from you, to help prevent spoofed emails from reaching your customers (and employees). Simple enough, but organisational sub-domains and how DMARC should be treated in each case are an added complexity to be considered here, though the protocol adequately allows for specific rules on sub-domains where necessary.</p><p>To really reap the benefits, DMARC reports needs to be requested, received and processed, with investigative analytics run on the resulting datasets to identify domain abuse, organisational mis-configurations, and deliverability issues.</p>]]></content:encoded></item><item><title><![CDATA[What Do Elephants And Spam-Filters Have In Common?]]></title><description><![CDATA[A few weeks ago a new customer was testing emails and their postal address kept getting flagged as a spammy phrase. ]]></description><link>https://www.sendforensics.com/blog/what-do-elephants-and-spam-filters-have-in-common/</link><guid isPermaLink="false">62fb0588539a030ca1a7e6fb</guid><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Thu, 02 Mar 2017 02:49:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/fc44d408325ef506c4d7160b2d4988f1_25.jpeg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/fc44d408325ef506c4d7160b2d4988f1_25.jpeg" alt="What Do Elephants And Spam-Filters Have In Common?"><p><strong><strong>The old adage &quot;an elephant never forgets&quot; contains more of an element of truth to it than you might expect. Never is a strong word, but scientists have nevertheless discovered an <a href="https://ed.ted.com/lessons/why-elephants-never-forget-alex-gendler">incredible capacity for memory</a> in these marvellous pachyderms. So what&apos;s with the ridiculous title?</strong></strong></p><p>A few weeks ago a new customer was testing emails and their postal address kept getting flagged in the system&apos;s Copywriting analysis as a spammy phrase. Now, it&apos;s a requirement of CAN-SPAM regulations that commercial messages must contain a valid physical (postal) address, so why was it being flagged as problematic?</p><p>In (understandable) frustration, the client contacted us for answers. Whenever this happens, we dive into the data manually to try and identify any tell-tale patterns or indicators.</p><h2 id="i-know-what-you-did-last-spammer">I Know What You Did Last Spammer</h2><p>Sometimes, a bit of background research is needed to solve this kind of puzzle, so after a bit of sleuthing around, one of our support engineers (let&apos;s call him Dominic because that&apos;s his name) uncovered a surprising history behind the address..</p><p>Turns out that a prolific sender of email scams used to inhabit the same business park address in San Diego, California that our client now resides in. Between 2011 and 2012, they flooded the internet with spam, and were named and shamed as a result:</p><figure class="kg-card kg-image-card"><img src="https://www.sendforensics.com/blog/content/images/2022/08/image.png" class="kg-image" alt="What Do Elephants And Spam-Filters Have In Common?" loading="lazy" width="780" height="326" srcset="https://www.sendforensics.com/blog/content/images/size/w600/2022/08/image.png 600w, https://www.sendforensics.com/blog/content/images/2022/08/image.png 780w" sizes="(min-width: 720px) 720px"></figure><p>They inhabited a different unit, but the rest of the address is exactly the same as appeared in both the original scam emails, and now in our client&apos;s legitimate email.</p><p>At the time, filtering-systems would have used this and other patterns to learn to identify these messages as spam, storing the markers in case they came round again.</p><p>It seems their memory held.</p><h4 id="what-to-do-move"><strong>What to do? Move..?</strong></h4><p>It may be that the memory will fade in time, or there is enough legitimate use of the address to eventually override the negative impact. But what can be done in the meantime?</p><p>Luckily, addresses can generally be written in a few different ways. Re-writing in a different format is usually enough to break the sequence, rendering the pattern unrecognisable.</p><p>To relate it to the case of our client and these spammers, I&apos;ve anonymised the address but it is in a similar format:</p><p><strong><strong>112 East Sample Street, #510, San Diego, CA 90210, USA</strong></strong></p><p>The identifiable chunks or &apos;strings&apos; common to both are &quot;112 East Sample Street&quot; and &quot;San Diego, CA 90210, USA&quot;, although the hash symbol (#) is also present.</p><p>To disrupt the recognition, the strings could be re-written in the following way, making this the full address:</p><p><strong><strong>112 E. Sample St, Unit 510, San Diego, California 90210, United States</strong></strong></p><p>Same address, different format, spam-markers reduced, higher deliverability ensues.</p><h2 id="an-elephant-never-forgets">An Elephant Never Forgets?</h2><p>Elephants and spam-filters would indeed appear to have similarly impressive memories then. However, &apos;perfect&apos; is perhaps too strong a word for even a filtering-system&apos;s memory as the environment changes so much over time.</p><p>Either new information negates historical effect, or there is simply so much to keep up with that old memories may eventually have to be replaced. Either way, we&apos;ll continue to watch that data closely.</p><p>It seems appropriate then to close with a more accurate expression for the digital age. Something that the many high-profile victims of leaks and/or the Streisand Effect can attest to:</p><p>The Internet Never Forgets.</p><p>There, FTFY.</p>]]></content:encoded></item><item><title><![CDATA[Do domain names affect deliverability?]]></title><description><![CDATA[Did you know the domain you choose can affect the deliverability of your emails? ]]></description><link>https://www.sendforensics.com/blog/do-domain-names-affect-deliverability/</link><guid isPermaLink="false">62fafec3539a030ca1a7e6a5</guid><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Leo Hatton]]></dc:creator><pubDate>Tue, 22 Apr 2014 07:54:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/luke-chesser-JKUTrJ4vK00-unsplash.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/luke-chesser-JKUTrJ4vK00-unsplash.jpg" alt="Do domain names affect deliverability?"><p>Got a business idea? Thought of a name yet? Okay, let&#x2019;s check the domain name, hopefully it&apos;s avail.. taken. Not to worry, let&#x2019;s do a subtle varia.. taken. Perhaps the alternative spell.. aaaand it&#x2019;s taken.</p><p>Small wonder we have startups calling themselves Yoose, Qeeple, Ubooly and suchlike.</p><p>Well, to add to the numerous considerations when choosing a domain name for your business, or simply a sub-domain for your outbound email marketing activities; here&#x2019;s another one (sorry).</p><p>Did you know the name you choose can affect the deliverability of your emails?</p><p>Well, it can, and sometimes the effects can be catastrophic.</p><p>We worked with a company who were having real trouble getting even basic one-to-one emails to their clients. The analysis revealed an unusual problem, which took even us by surprise. Their standard company email signature contained, as most do, a link to their site. This was the link:</p><!--kg-card-begin: html--><p style="font-weight:bold">http://www.executive<span>&#x2588;&#x2588;&#x2588;</span>.com</p><!--kg-card-end: html--><p>Innocent enough, but a spam-filtering system scanning through the mail would see this pattern:</p><!--kg-card-begin: html--><p style="font-weight:bold">http://www<span style="color:red">.exe</span>cutive<span>&#x2588;&#x2588;&#x2588;</span>.com</p><!--kg-card-end: html--><!--kg-card-begin: html--><p><span style="color:red; font-weight:bold">.exe</span> in an email? The horror.</p><!--kg-card-end: html--><p>As the file-extension for Windows executables, this is almost universally blocked by spam-filtering systems as one of the most common attack vectors for viruses/malware etc. Yes, it&#x2019;s not attached as a file, but if a primitive mailscanner reads .exe, it&#x2019;s not going to take the chance on a potentially nefarious embedded executable.</p><p>Luckily, this is easily fixed by changing the link slightly:</p><!--kg-card-begin: html--><p style="font-weight:bold">http://executive<span>&#x2588;&#x2588;&#x2588;</span>.com</p><!--kg-card-end: html--><p>Voila, no .exe pattern, problem solved.</p><h2 id="bad-luck-and-subdomains">Bad luck and subdomains</h2><p>In a constantly fluctuating environment, the words and phrases ignored by spam-filtering systems one minute can be frowned-upon the next. Simple bad luck can have your chosen domain/sub-domain flagged as a spam-heavy word, but some prior thought can minimise the risks.</p><p>We wouldn&#x2019;t, for example, choose <strong><strong>viagra.example.com </strong></strong>as a sending subdomain. However, on the other end of the Captain Obvious scale, we&#x2019;d also stay clear of something like <strong><strong>offers.example.com </strong></strong>or<strong><strong> deals@mailer.example.com </strong></strong>if we&apos;re talking full sending addresses.</p><p>Even purely on string-searching, this kind of behaviour makes it easy for spam-filtering technologies to sort your mail into the &apos;appropriate&apos; folder (read: spam folder).</p><p>As long as it comes from the right domain, very few people notice or care about the full sending address, so you really do have a lot of options for choosing something innocuous to spam-filters.</p><p>Choose wisely and, I don&apos;t know, perhaps test your choices before you send with some kind of <a href="https://www.sendforensics.com/email-deliverability-features/">pre-emptive email deliverability system</a>.</p>]]></content:encoded></item><item><title><![CDATA[Do Safe Sender Lists Help?]]></title><description><![CDATA[You have probably noticed that bulk mail senders often include instructions to add their message to your Safe Senders List in order to bypass future checks. Is this a good idea?]]></description><link>https://www.sendforensics.com/blog/do-safe-sender-lists-help/</link><guid isPermaLink="false">62fb05fd539a030ca1a7e710</guid><category><![CDATA[Deliverability]]></category><dc:creator><![CDATA[Les Hatton]]></dc:creator><pubDate>Fri, 25 Jan 2013 00:00:00 GMT</pubDate><media:content url="https://www.sendforensics.com/blog/content/images/2022/08/stephen-phillips-hostreviews-co-uk-3Mhgvrk4tjM-unsplash.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.sendforensics.com/blog/content/images/2022/08/stephen-phillips-hostreviews-co-uk-3Mhgvrk4tjM-unsplash.jpg" alt="Do Safe Sender Lists Help?"><p>You have probably noticed that bulk mail senders often include instructions to add their message to your Safe Senders List in order to bypass future checks. Is this a good idea? Well no, unfortunately.</p><p>First of all, for a mail sender to do this, they obviously do not trust their own ability to craft an email so that it will be clearly differentiated as non-spam by most if not all mail servers.</p><p>Second, it has a number of problems. For example, if a spammer masquerades with this sending address, (and there is nothing to stop them in the emailing protocol because such spoofing is allowed), the resulting spam will just sail through all your checks, depositing its toxic contents in your inbox. This led Microsoft to remove the possibility of adding a whole domain to the Safe Senders List in Exchange 2010, restricting it to individual addresses only.</p><p>Even if a spammer does not spoof the address, you are basically saying to the mail sender that you will trust everything they send in future. No mail sender can guarantee the sanctity of all future email and it is all too common that a toxic link gets unwittingly included in an otherwise genuine bulk mail from a genuine sender.</p><p>SendForensics never uses Safe Sender techniques. Instead, every email is subjected to full forensic analysis to mirror the current state of the rapidly changing internet threat landscape. That way deliverability remains a controllable objective measurement rather than an uncontrollable leap of faith.</p>]]></content:encoded></item></channel></rss>