9 Things Every Marketer Must Know About Email

Total Page:16

File Type:pdf, Size:1020Kb

9 Things Every Marketer Must Know About Email THINGS EVERY MARKETER MUST KNOW ABOUT EMAIL with Greg Kraios & Chris Arrendale Inbox Pros TABLE OF CONTENTS CHAPTERS 1 Deliverability Branding 3 2 Shared IP vs. Dedicated IP 7 3 Feedback Loops 13 4 No-Reply's 18 5 Setting Subscriber Expectations 21 6 Single Opt-In vs. Double Opt-In 29 7 Permission Marketing 37 8 Email Authentication 44 9 Email Throttling 50 250ok.com | InboxPros.com 2 Your domain is your identity. Write that down on a Post-It Note and stick it to your monitor. Now repeat after us, “my domain is my identity.” DELIVERABILITY It’s the identity that your customers, the recipients of your marketing and transactional messages, have come to trust, or believe they can. It’s this trust that you must BRANDING: YOUR guard as if your business depends on it because it often DOMAIN IS YOUR does. How so? In the 2015http://www.pardot.com/blog/the-2015-email-marketing-landscape/ State of Marketing Report, the Salesforce survey of 5,000 marketers revealed 20% of IDENTITY the audience reported their business primary revenue source is directly linked to email operations. Those people saying email is dead? Tell them to put that stat in their pipe and smoke it (in locations where that’s legal, of course). So, in an eort to get your identity in order, we are going to focus on the Display Name or Friendly From, From Address, and the links used within the email. EMAIL, STILL NOT DEAD 3 1 | DELIVERABILITY BRANDING THE INBOX EXPERIENCE The Friendly From, subject line, and preview text are the In a perfect world, an intuitive and consistent first connections your message has with a subscriber. It’s Friendly From should: an email’s first moment of truth. Now, consider this - the • Reinforce recipient trust in your email average email user receives 215 emails per day (http://www.radicati.com/wp/wp-content/uploads/2015/02/Email-Statistics-Report-2015-2019-Executive-Summary.pfhttp://www.radicati.com/wp/wp-content/uploads/2015/02/Email-Statistics-Report-2015-2019-Executive-Summary.pdfThe channel https://www.verisign.com/en_US/domain-names/domain-name-search/index.xhtmlRadicati Group). It’s an email deluge out there, so clearly identifying yourself and purpose helps you cut through • Instantly provide insight as to the inbox noise. nature of the message you’re sharing • Improve the odds of a message getting discover by a subscriber that’s located somewhere other than in their primary inbox (i.e., promotions tab, junk, trash) • Increase the odds the subscriber will add your email address to their address book (“whitelisting”/ ”safe listing”) • Help subscribers search, sort, and archive messages • Ultimately, improve the likelihood of an Friendly From Subject Line Preview Text open and a better brand experience Example of the Gmail mobile experience 250ok.com | InboxPros.com 4 1 | DELIVERABILITY BRANDING Along the same lines, a branded and appropriate From Gmail, Yahoo!, and AOL can aect the deliverability of Address can also be crucial for getting your subscriber emails sent by various email service providers (ESPs), so to open the email. Choose a From Address related to our recommendation is to use a domainhttps://www.verisign.com/en_US/domain-names/domain-name-search/index.xhtml you own. the mail stream (e.g., support, billing, promotions) and Neither you or your organization have one? Learn how don’t change it. In addition to your customers, internet to register a domain. After all, your domain is your service providers (ISPs) prefer to see stability in the identity, right? From Address. LEGAL STUFF For those mailing to U.S. subscribers, there is a non-negotiable requirement that your From Address and Reply-To Address “must be accurate and identify the person or business who initiated the message,” according to the https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-businessCAN-SPAM legislation. Example of the From Address Sending to subscribers in the E.U.? Disguising or concealing the identity of the sender on whose behalf USING A FREE EMAIL SERVICE ADDRESS the communication mailed is strictly prohibited. Canada FOR YOUR FROM ADDRESS requires that the sender must identify itself and the If you use a free email service for the address you persons on whose behalf a commercial electronic provide in the From Address field, a warning may appear message is sent. We’re not attorneys, so we recommend that recommends registering for a domain. The DMARC you consult someone who is when setting up your email http://kb.mailchimp.com/accounts/email-authentication/about-dmarc authentication policies for some free email services like program. 250ok.com | InboxPros.com 5 1 | DELIVERABILITY BRANDING PREVIEW TEXT BRANDED EMAIL LINKS While we're trying to stay on topic with domain branding, Finally, branded email links are also important in making we had to mention preview text - the text that your customers feel comfortable clicking on links. When immediately follows the subject line. Again, this is your your subscribers hover over a link in the content, ensure email's first moment of truth in the inbox, so you need to that the link is branded with your domain, or a optimize the preview text when possible. subdomain, and not a shared domain provided by a third party. Most ESPs have the ability to apply custom Our friends at Litmus did a nice job explaining domains for link tracking. This type of link not only helps https://litmus.com/blog/the-ultimate-guide-to-preview-text-supportpreview text in detail and created a list of email clients with any shared link reputation factors, but it reinforces that display preview text. trust. Example of Preview Text 250ok.com | InboxPros.com 6 An Internet Protocol address (IP address) is a numerical number assigned to any device connected to the Internet. When it comes to sending mail, your IP address a single dedicated IP address at places like SendGrid or allows ISPs to identify you and your mail server. SparkPost is a drop in the bucket compared to the piles DELIVERABILITY of cash you burn on PPC on a daily basis. When you hit send, your email is transmitted from your IP address to the ISP’s receiving mail server, who then And let’s not forget your transactional mail – password DECISIONS: decides whether or not to accept your message based resets, order confirmations, shipping notifications – that your IP’s reputation, sending practices, etc. These you depend on to minimize customer support inquiries SHARED IP VS. factors directly impact whether you land in the inbox, and optimize the brand experience. If email is your spam, or get blocked altogether. A clean IP doesn’t primary driver of communication and critical to revenue, guarantee inbox placement, as the journey an email this is not the place to be penny-wise. For most DEDICATED IP takes is complicated, but you get the picture. businesses, cost should not be the driving factor in the decision-making process. As you consider your IP options, know you’ll use a shared IP, a dedicated IP, or a pool of dedicated IPs. LET’S GET THE COST CONVERSATION OUT OF THE WAY If messaging and communication is important enough to the success of your business, and you step back and look at the overall budget of your marketing programs, you’ll see that the extra $20/month or so you'll spend on 7 2 | SHARED IP VS. DEDICATED IP a single dedicated IP address at places like SendGrid or senders with inconsistent sending behaviors (e.g., SparkPost is a drop in the bucket compared to the piles seasonal senders). The downside of the shared IP is that of cash you burn on PPC on a daily basis. pooling together with other senders leaves you with $44 ROI limited power to influence the sender reputation and it And let’s not forget your transactional mail – password exposes you to greater risk based on the sending resets, order confirmations, shipping notifications – that behaviors of your IP neighbors. you depend on to minimize customer support inquiries ON EVERY and optimize the brand experience. If email is your Life on a shared IP tends to weaken performance for the primary driver of communication and critical to revenue, best senders and improve performance for lower quality this is not the place to be penny-wise. For most senders. That being said, the ESPs of today are businesses, cost should not be the driving factor in the extremely skilled at uncovering and shutting down decision-making process. $1 abusive senders, and getting even better at predicting bad behaviors before they happen. Bottom-line: If you are a small, irregular or infrequent INTRO TO SHARED IP SPENT ON sender, the standard shared IP environment at most The shared IP environment involves a series of IP top-level ESPs is a great option. Also, if you have higher addresses used to send mail from a single organization EMAIL than average hard bounce rate (3%+), the shared IP or a group of unrelated organizations. This group of IPs environment is a safer place for you. is also known as the “shared IP pool.” The shared IP is Source: Direct Marketing News 2015 If messaging and communication is important enough to the entry-level environment oer by most ESPs. the success of your business, and you step back and look at the overall budget of your marketing programs, Shared IPs are often used to group the outbound mail you’ll see that the extra $20/month or so you'll spend on delivery of multiple, low-volume senders or smaller 250ok.com | InboxPros.com 8 2 | SHARED IP VS.
Recommended publications
  • ITU Botnet Mitigation Toolkit Background Information
    ITU Botnet Mitigation Toolkit Background Information ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector January 2008 Acknowledgements Botnets (also called zombie armies or drone armies) are networks of compromised computers infected with viruses or malware to turn them into “zombies” or “robots” – computers that can be controlled without the owners’ knowledge. Criminals can use the collective computing power and connected bandwidth of these externally-controlled networks for malicious purposes and criminal activities, including, inter alia, generation of spam e-mails, launching of Distributed Denial of Service (DDoS) attacks, alteration or destruction of data, and identity theft. The threat from botnets is growing fast. The latest (2007) generation of botnets such as the Storm Worm uses particularly aggressive techniques such as fast-flux networks and striking back with DDoS attacks against security vendors trying to mitigate them. An underground economy has now sprung up around botnets, yielding significant revenues for authors of computer viruses, botnet controllers and criminals who commission this illegal activity by renting botnets. In response to this growing threat, ITU is developing a Botnet Mitigation Toolkit to assist in mitigating the problem of botnets. This document provides background information on the toolkit. The toolkit, developed by Mr. Suresh Ramasubramanian, draws on existing resources, identifies relevant local and international stakeholders, and
    [Show full text]
  • M AAWG: Hosting Past, Present & Future
    3 M AAWG: Hosting Past, Present & Future Justin Lane - BlueHost and M3AAWG Hosting Co-Chair Jesse Sowell, PhD and M3AAWG Advisor 5 May 2016 LACNIC 25, La Habana, Cuba www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group Hosting: Not a Big Issue, Right? For many years the Community looked at Hosting Companies like this picture. We where a small area that did not look to be that important. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group A Brief History of Hosting Hosting Companies in the beginning where a small part of the overall environment. Most of the Hosting Companies at the time offered plans that gave their clients 20-50MB of space to use for their websites. ESP’s and ISP’s where much bigger players. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What Hosting Offers Hosting Companies were able to offer all the services needed to get a company online and ready to service their customers. • Email Services • CMS, and Webdesign • Hardware from Dedicated Servers or Colocation Servers to Shared or Virtual Server Space • Bandwidth for your Business, Dedicated Ips and SSL Services • Access to Hardware that most smaller businesses were not able to afford on their own. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What is Happening Today? As the community got better at policing ISP’s, ESP’s and other problem areas, the criminal elements began to migrate to the Hosting Platforms. With Hosting Companies these criminal elements were even better positioned to carry out their plans.
    [Show full text]
  • IFIP AICT 394, Pp
    A Scalable Spam Filtering Architecture Nuno Ferreira1, Gracinda Carvalho1, and Paulo Rogério Pereira2 1 Universidade Aberta, Portugal 2 INESC-ID, Instituto Superior Técnico, Technical University of Lisbon, Portugal [email protected], [email protected], [email protected] Abstract. The proposed spam filtering architecture for MTA1 servers is a component based architecture that allows distributed processing and centralized knowledge. This architecture allows heterogeneous systems to coexist and benefit from a centralized knowledge source and filtering rules. MTA servers in the infrastructure contribute to a common knowledge, allowing for a more rational resource usage. The architecture is fully scalable, ranging from all-in- one system with minimal components instances, to multiple components instances distributed across multiple systems. Filtering rules can be implemented as independent modules that can be added, removed or modified without impact on MTA servers operation. A proof-of-concept solution was developed. Most of spam is filtered due to a grey-listing effect from the architecture itself. Using simple filters as Domain Name System black and white lists, and Sender Policy Framework validation, it is possible to guarantee a spam filtering effective, efficient and virtually without false positives. Keywords: spam filtering, distributed architecture, component based, centralized knowledge, heterogeneous system, scalable deployment, dynamic rules, modular implementation. 1 Introduction Internet mail spam2 is a problem for most organizations and individuals. Receiving spam on mobile devices, and on other connected appliances, is yet a bigger problem, as these platforms are not the most appropriate for spam filtering. Spam can be seen as belonging to one of two major categories: Fraud and Commercial.
    [Show full text]
  • Blocklist Babel: on the Transparency and Dynamics of Open Source Blocklisting
    1 Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting Alvaro´ Feal, Pelayo Vallina, Julien Gamba, Sergio Pastrana, Antonio Nappa, Oliver Hohlfeld, Narseo Vallina-Rodriguez, and Juan Tapiador Abstract—Blocklists constitute a widely-used Internet security are protecting an estimated 3,126,410,000 user mailboxes [1]. mechanism to filter undesired network traffic based on IP/domain Similarly, MISP (Malware Intelligence Sharing Platform [2]), reputation and behavior. Many blocklists are distributed in open a popular open source threat intelligence platform, reports that source form by threat intelligence providers who aggregate and process input from their own sensors, but also from third- it is used by more than 6,000 organizations worldwide. Beyond party feeds or providers. Despite their wide adoption, many blocklists, other feeds can be used by applications to block or open-source blocklist providers lack clear documentation about restrict access. One example are feeds of Tor exit node IPs, their structure, curation process, contents, dynamics, and inter- e.g., used by Wikipedia to block users of the Tor anonymity relationships with other providers. In this paper, we perform network from editing Wikipedia due to abuses in the past [3]. a transparency and content analysis of 2,093 free and open source blocklists with the aim of exploring those questions. To Blocklists can be proprietary (i.e., commercial) or open that end, we perform a longitudinal 6-month crawling campaign source. The former are often available through rate-limited, yielding more than 13.5M unique records. This allows us to shed license-based, or pay-per-use mechanisms and are maintained light on their nature, dynamics, inter-provider relationships, and by for-profit companies specialized in threat intelligence.
    [Show full text]
  • Contents Software Description:
    Swift Email Processor v2.0 www.webemailverifier.com Support: www.webemailverifier.com/supportsuite/ Contents Software Description: ................................................................................................................................... 3 Program GUI Screenshots: ............................................................................................................................ 4 Program Features: ........................................................................................................................................ 9 Chapter 1: Installation and Settings Configuration ..................................................................................... 11 Configuration and Settings: .................................................................................................................... 12 Chapter 2: Using the Proxy Servers Module ............................................................................................... 31 Chapter 2.1: X-Originating-IP email header & Proxy Acceptable Usage Policy .......................................... 35 Chapter 3: Sending Messages using the Sender Module ........................................................................... 36 3.1: Unsubscribe link placements ........................................................................................................... 49 3.2: Installing and using the MySQL/MariaDB CRUD API script or application ...................................... 50 3.2.1 Installing MySQL API on Linux Server running
    [Show full text]
  • Messaging, Malware and Mobile Anti-Abuse Working Group M3AAWG Best Current Practices for Building and Operating a Spamtrap Version 1.2.0 Updated August 2016
    Messaging, Malware and Mobile Anti-Abuse Working Group M3AAWG Best Current Practices For Building and Operating a Spamtrap Version 1.2.0 Updated August 2016 Table of Contents INTRODUCTION .............................................................................................................................................. 1 SPAMTRAP GOALS/PURPOSE ........................................................................................................................ 2 SPAMTRAP ADDRESSES .................................................................................................................................. 2 ISSUES WITH ADDRESSES ............................................................................................................................................................. 3 IMPLEMENTATION CONSIDERATIONS .................................................................................................... 3 ANALYSIS ............................................................................................................................................................ 4 SECURITY ........................................................................................................................................................... 5 INFORMATION SHARING .............................................................................................................................. 5 HINTS AND PITFALLS ....................................................................................................................................
    [Show full text]
  • Das Umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm Gmbh, Heidelberg
    Stichwortverzeichnis Numerisch Links 95 8Seconds 576 Marketing 56, 189 Netzwerk 189 A Relations 83, 85 Abmeldung 259, 378, 719, 746, 806 AIDA 335 mentale 260, 496, 530 Akkreditierung 836 Above-the-Scroll 118, 682 Aktionstag 237 Absender 681 Aktionstage 237 Auswahl 411 Aktivierung 424 Fälschung siehe Spoofing Alternativhypothese 556 siehe Wechsel 111, 413 Alt-Text Grafik-Alternativtext siehe Abuse Reporting Format siehe ARF America Online AOL AddThis 639 Anbieterauswahl 94 siehe AddToAny 640 Anhang E-Mail-Anhang Adobe AniMake 447 Photoshop 445 Animation 123, 367, 443, 460, 612, 616 Adress Anmeldeformular Harvesting 799 Anrede 137, 235 Miete 78 Auswahlliste 164 Validierung 817 Bezeichner 157 siehe Adressbuch-Eintrag 208, 345, 843 Call-to-Action Handlungsaufforde- Adresse rung Adressbuch 208 Fehlermeldung 164 Alter 196 Geburtsdatum 134, 136, 144, 163 Bestand siehe Verteiler Gruppierung 153 catch-all 814 JavaScript 168 Ermüdung 260 kontextsensitives 130 Gewinnung 74 Lückentext 166 Kauf 175, 186 Optionsfeld 125, 160, 163 Markt 199 Redundanzfreiheit 137 Miete 66, 192 Reihenfolge 154, 159 Qualität 144, 183 Textfeld 148, 161 Quantität 183 Tooltip 161 Quelle 175, 183, 230 Validierung 165 Validierung 217 Video 181 Advanced Research Projects Agency Network Anrede 354 siehe ARPAnet Anzeigenwerbung 79, 180, 192, 308, 565, Affiliate 657, 741 897 © des Titels »E-Mail-Marketing – Das umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm GmbH, Heidelberg. Nähere Informationen unter: http://www.mitp.de/5095 Stichwortverzeichnis
    [Show full text]
  • Modul 42 Spam
    Modul 42 Spam Studienbrief 1: Grundlagen Studienbrief 2: Spam-Techniken Studienbrief 3: Anti-Spam Techniken Studienbrief 4: Rechtslage Autoren: Christopher Wolf Sebastian Uellenbeck 1. Auflage Ruhr-Universität Bochum © 2013 Ruhr-Universität Bochum Universitätsstraße 150 44801 Bochum 1. Auflage (17. Juli 2013) Didaktische und redaktionelle Bearbeitung sowie Produktion: Romy Rahnfeld (M. A. Germanistik Sprachwissenschaft/Erziehungswis- senschaft) Das Werk einschließlich seiner Teile ist urheberrechtlich geschützt. Jede Ver- wendung außerhalb der engen Grenzen des Urheberrechtsgesetzes ist ohne Zustimmung der Verfasser unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspe- icherung und Verarbeitung in elektronischen Systemen. Inhaltsverzeichnis Seite3 Inhaltsverzeichnis Einleitung zu den Studienbriefen6 I. Abkürzungen der Randsymbole und Farbkodierungen.......6 II. Zu den Autoren..............................7 III. Modullehrziele..............................8 Studienbrief 1 Grundlagen9 1.1 Lernziele..................................9 1.2 Einleitung.................................9 1.2.1 E-Mail...............................9 1.2.2 Spam................................ 11 1.2.3 RFC (Request for Comments).................. 15 1.2.4 Gliederung............................ 16 1.2.5 Kontrollaufgaben......................... 16 1.3 Internet................................... 17 1.4 E-Mail-Infrastruktur........................... 17 1.4.1 Kommunikationsmodell..................... 18
    [Show full text]
  • Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities PH.D THESIS Antonio Nappa Copyright c February 2016 by Antonio Nappa DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor en Inform´atica Author: Antonio Nappa Advisor Dr. Juan Caballero February 2016 Jury: Somesh Jha, Professor of Computer Sciences - University of Wisconsin-Madison Lorenzo Cavallaro, Senior Lecturer of Computer Sciences - Royal Holloway University of London Juan Manuel Est´evez Tapiador, Profesor Titular de Universidad - Universi- dad Carlos III de Madrid Victor A. Villagr´a, Profesor Titular de Universidad - Universidad Polit´ecnica de Madrid Boris K¨opf, Assistant Research Professor - IMDEA Software Institute Carmela Troncoso, Researcher - IMDEA Software Institute Manuel Carro, Profesor Titular de Universidad - Universidad Polit´ecnica de Madrid Resumen de la tesis Esta tesis se centra en el an´alisisde dos aspectos complementarios de la ciberdelin- cuencia (es decir, el crimen perpetrado a trav´esde la red para ganar dinero). Estos dos aspectos son las m´aquinasinfectadas utilizadas para obtener beneficios econ´omicosde la delincuencia a trav´esde diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utiliza- dos para gestionar estas m´aquinas(por ejemplo, C & C, servidores explotadores, servidores de monetizaci´on,redirectores). En la primera parte se investiga la exposici´ona las amenazas de los orde- nadores victimas.
    [Show full text]
  • M3AAWG Complaint Feedback Loop Best Current Practices
    Messaging Anti-Abuse Working Group (MAAWG) Complaint Feedback Loop Best Current Practices April 2010 Introduction Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices. This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already-common industry best practices. This paper is the result of cooperative efforts within the Messaging Anti-Abuse Working Group. MAAWG is the largest global industry association working against Spam, viruses, denial-of-service attacks and other online exploitation. It members include ISPs, network and mobile operators, key technology providers and volume sender organizations. It represents over one billion mailboxes worldwide and its membership contributed their expertise in developing this description of current Feedback Loop practices. Table of Contents Glossary of Standard Terms ...................................................................................................................................................2 Overview.................................................................................................................................................................................5 Mailbox Providers and Feedback Providers ..........................................................................................................................6 Benefits of Providing Feedback
    [Show full text]
  • Mail Assure Admin Guide
    Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Monday, February 11, 2019 ----------- ©2019 CONTENTS Getting Started 1 Useful Links 1 Accessing Mail Assure 1 User Permissions 3 Timeout Settings 4 Supported Web Browsers 4 Multi-admin control panel access and audit trail 4 Retrieve Log-in Link 6 Existing Account - Forgotten Password 7 Create New Email Account via the Retrieve Log-in Link 7 Send User Customized Link to Reset Password 7 Admin Level Control Panel 7 What do you want to do? 7 Domain Level Control Panel 8 Accessing the Domain Level Control Panel 8 Email Level Control Panel 8 Accessing the Email Level Control Panel 9 What do you want to do? 9 Using the 'Login as' Feature 9 Log in as a Domain user. 9 Log in as an Email User 10 Finish Login as Session 11 Start a Free 30-day Trial with Mail Assure 11 Application Overview 12 Navigating Mail Assure 12 Customize Dashboard 12 Mail Assure Edit Dashboard Panel Group 13 Add a Widget 13 Reset to Default Dashboard Setting 13 Features Preview 14 List of features in Preview mode 14 API Logs (Preview) 14 Archive Usage (Preview) 15 Email Scout Report Templates (Preview) 16 Create Email Scout Report Template 17 View Incoming/Outgoing Reports from a Particular Template 25 On-demand Archive Index 26 What's New 27 New Navigation/Dashboard Feature Mapping 36 Admin Level Mappings 36 Domain Level Mappings 41 Email Level Mappings 45 FAQs 47 Troubleshooting Tips 49 Incoming mail is wrongly blocked 49 Incoming spam is getting through 49 Outgoing mail is wrongly blocked 50 Report Security
    [Show full text]