{"id":1133,"date":"2017-10-13T03:03:19","date_gmt":"2017-10-13T08:03:19","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=1133"},"modified":"2017-10-13T03:03:19","modified_gmt":"2017-10-13T08:03:19","slug":"exchangedefender-bounce-whitelisting-quarantine-access","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2017\/10\/exchangedefender-bounce-whitelisting-quarantine-access\/","title":{"rendered":"ExchangeDefender Bounce Whitelisting &amp; Quarantine Access"},"content":{"rendered":"<p>We\u2019ve never invested as much as we have in 2017 when it comes to infrastructure and now that those massive upgrades are nearing completion, you\u2019ll start seeing an avalanche of new features and services we\u2019ve been working on all year starting to show up. I wanted to write this blog post to address one that is the largest piece of annoyance for our clients and that is whitelisting bounce emails and domains.<\/p>\n<blockquote>\n<p>A little bit of background: Every time you see a bounce*@ email address is the last time you will see that address. These disposable, script generated addresses are only valid for a short period of time and are used by the mailing list companies to track bouncebacks and replies to their campaigns. On is generated for every single email sent out and if you look closely at them they usually have a random string or your email encoded in the user part of the email address. Whitelisting them, as so many people often try, is to put it simply: pointless. Naturally when the next email comes in from <em>\u201cthe same sender\u201d<\/em> it\u2019s going to have a completely different from address and the old whitelist entry will not fire. This tends to get really annoying really fast for clients that don\u2019t understand what is going on behind the scenes.<\/p>\n<\/blockquote>\n<p>To make things easier and assure delivery in the future, ExchangeDefender will now detect when you\u2019re attempting to whitelist a bounce\/disposable address and offer to whitelist the entire domain for you. We\u2019ve stripped out the product branding so you can forward this to your clients or include in your own documentation\/newsletter. When they click on a Trust link in an email report they will see this prompt:<\/p>\n<p><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/TrustedSender.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"207\" title=\"TrustedSender\" style=\"display: inline; background-image: none;\" alt=\"TrustedSender\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/TrustedSender_thumb.jpg\" border=\"0\"><\/a><\/p>\n<p>And if they go through our online portal and attempt to whitelist a temporary bounce email, they will see this:<\/p>\n<p><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/DomainWhitelist.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"227\" title=\"DomainWhitelist\" style=\"display: inline; background-image: none;\" alt=\"DomainWhitelist\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/DomainWhitelist_thumb.jpg\" border=\"0\"><\/a><\/p>\n<p>Is that all? Well, not quite. You see, most of these bounce lists are coming from legitimate sources such as Constant Contact, MailChimp, SalesForce, etc. Later this fall we will be releasing a new \u201cNewsletter\u201d feature but in the meantime our new managed whitelist (enterprise-wide) will make sure these bounce messages getting caught in SPAM folders due to their contents (but from legitimate sources) are no longer something your clients have to worry about fishing out. So yay, less work for everyone involved!<\/p>\n<p><strong>One more thing<\/strong><\/p>\n<p>While we\u2019re on the <em>\u201cless work\u201d<\/em> train, infections and filename\/filetype policy violations will no longer involve going through our team to release messages. You can now release infected or policy violating attachments\/messages on your own through the Domain login at <a href=\"https:\/\/admin.exchangedefender.com\">https:\/\/admin.exchangedefender.com<\/a>. (<em>psst. You can even let your clients \/ CIO types access this since it\u2019s a domain-level feature, not an MSP-level feature<\/em>)<\/p>\n<p><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/Infected.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"256\" title=\"Infected\" style=\"display: inline; background-image: none;\" alt=\"Infected\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2017\/10\/Infected_thumb.jpg\" border=\"0\"><\/a><\/p>\n<p>Proceed with caution though, delegating access to this content is still a terrible idea though and please make sure you have adequate sandbox\/antivirus\/anti-rootkit software installed anywhere you download these. For every legitimate release request we get there are dozens of \u201cNo, my client does a lot of business with UPS and they definitely need that .exe that UPS emailed them.\u201d <\/p>\n<p>We hope these new features make you more productive and safer online. We\u2019re really excited about everything else we have coming up!<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1133","post","type-post","status-publish","format-standard","hentry","category-exchangedefender"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=1133"}],"version-history":[{"count":1,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1133\/revisions"}],"predecessor-version":[{"id":1134,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1133\/revisions\/1134"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=1133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=1133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=1133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}