Email Security

Email

23 sections
255 source tickets

Last synthesized: 2026-02-13 01:28 | Model: gpt-5-mini
Table of Contents

1. VIPRE quarantine misclassified legitimate mail as 'Bulk' — releases and whitelists restored delivery

157 tickets

2. Scan-to-Mail delivery delays and device provisioning/network issues for campus printers

2 tickets

3. Missing messages due to envelope-from/display-from differences and focused-inbox/diversion interactions

7 tickets

4. Staged DMARC enforcement rollout for primary domain after third‑party sender fixes

2 tickets

5. Outbound delivery failures and spam placement from Salesforce / third‑party senders due to missing DKIM/SPF

6 tickets

6. Outbound messages quarantined by content/profanity filter (blocked words)

2 tickets

7. Mail bounces caused by disallowed attachment file types and macro‑enabled documents

7 tickets

8. Emails (inbound and outbound) held by quarantine due to flagged URLs or phishing suspicion

41 tickets

9. S/MIME encrypted replies failing due to outdated/missing external certificates

6 tickets

10. Spam forwarded to inactive helpdesk address and mischaracterized as organization‑wide incident

1 tickets

11. Mailbox-level blocking when perimeter filters allow external marketing/spam

7 tickets

12. Jungle Mail prevented use of site sender address when site appeared as 'Default Site' and address was not available

1 tickets

13. PDF receipts blocked by automated Microsoft Purview Message Encryption / DLP rule

4 tickets

14. Bounce-back flood caused by forged envelope-from addresses submitted via public web forms

1 tickets

15. External sender blocked by organizational forwarding restriction when sending to helpdesk addresses

3 tickets

16. Salesforce outbound blocked when sender address remained unverified

1 tickets

17. Scoped blocking of legacy proctoring domains for student mailboxes

1 tickets

18. Outbound delivery failures caused by recipient listed on internal block‑list

1 tickets

19. Application SMTP authentication interruption causing outbound mail failures and blocked source IPs

1 tickets

20. Third‑party vendor global suppression list blocking domain recipients (DotDigital)

1 tickets

21. Reported non‑receipt where inbound mail was delivered and not blocked by spam filters

1 tickets

22. Missing inbound mail caused by incorrect recipient address (misaddressed messages)

1 tickets

23. Unreadable rights‑protected (AIP/Microsoft Rights) email displayed as 'rights protected message' and not viewable

1 tickets

1. VIPRE quarantine misclassified legitimate mail as 'Bulk' — releases and whitelists restored delivery
95% confidence
Problem Pattern

Inbound legitimate messages (newsletters, transactional notifications, bookings/confirmations, invoices, form responses, OTPs and internal staff mail) were classified by VIPRE Email Security as 'Bulk', 'High Threat', 'Low Threat' or 'Spam' and placed in gateway quarantine or server‑side queues, preventing delivery. Recipients received Quarantine Summary notifications (mailanyone.net or Microsoft 365 Security) that were sometimes read‑only; quarantines sometimes listed URL blocklist hits, processing‑error notes (for example 'ProcessMessageFromQuercus'), 'bulk sendout' or sender‑infrequency flags, or omitted attachments in the quarantine UI. Recurring holds frequently affected messages from third‑party sending platforms using variable IP ranges; affected systems included the VIPRE gateway, mail gateway quarantines and Exchange/Office 365 mailboxes.

Solution

Technicians located affected messages in VIPRE quarantine listings and in server‑side queues and released legitimate items so they delivered to recipients. Repeatedly held senders or domains were added to VIPRE gateway safe‑sender/allowlists or to mailbox‑specific allowlists; when third‑party platforms used variable sending IP ranges, platform IP ranges were added to allowlists. Equivalent allowlist or anti‑spam policy changes were recorded for Microsoft Defender/Exchange cases. When quarantines listed URL blocklist hits (for example calendar links) the blocklist entry was removed and the item released. Messages showing processing‑error strings (for example 'ProcessMessageFromQuercus') were identified from logged notes and released from the gateway.

Helpdesk staff released items on behalf of users when Quarantine Summary reports were view‑only and adjusted quarantine‑report recipient lists when necessary. To avoid bounces from forwarding quarantined messages into ticketing systems, items were released directly from the gateway rather than forwarded. Time‑sensitive one‑time verification messages that had expired by the time of release required re‑issuance by the sender. A small number of incidents showed errors when applying whitelist entries; those were handled by retrying administrative whitelist changes or applying alternative allowlist/policy updates so the sender could deliver. In some cases administrators added a sender to a safe list without releasing historical quarantined items at the user's request; those requests and actions were logged.

Domain‑wide whitelisting requests that were refused on security or data‑protection grounds were declined or replaced with limited sender‑level or mailbox‑specific allowlisting and the requester was informed. Where allowlisting proved insufficient or inappropriate, SOC/administrators adjusted quarantine/filter rules to stop internal or institution‑owned addresses being flagged as false positives. Technicians confirmed quarantined message identities (for example by requesting subject lines) when the quarantine UI omitted attachments and released items so attachments delivered. Actions and allowlist changes were logged with the responsible administrator.

Observed senders across incidents included commercial newsletter and transactional mailers (Mailjet, Amazon SES/Jotform, Ghost, dotdigital, Mandrill, HubSpot), marketing/ESP platforms (ExactTarget/SFMC), event/registration and application services (Cvent, On24, Sitefinity, Smapply), credentialing and notification services (Credly, Stripe, Handshake, OpenAI, Pearson, Perkbox), corporate partners and third‑party services (Randstad, IncisiveMedia, customervoice360, Hespa, BPP) and institutional senders. A small number of tickets recorded only a terse resolution note (for example 'Done'); relevant diagnostic and change logs were retained where available.

Source Tickets (157)
2. Scan-to-Mail delivery delays and device provisioning/network issues for campus printers
80% confidence
Problem Pattern

Campus printers/scanners failed to deliver scanned documents (Scan-to-Mail) or experienced delivery delays; some messages landed in spam/quarantine or were flagged as phishing. Affected devices included networked Canon/Dell printers and scanners that sometimes reported no Internet on the Student WLAN or lacked the IU_Internal company portal provisioning. Users also reported attached USB media not visible on devices. Error indicators included anti-spam quarantines for intra-org sender addresses and device-reported network/connectivity errors.

Solution

Multiple root causes for Scan-to-Mail failures were identified and resolved. A transient fault in the mail gateway that had been delaying Scan-to-Mail messages was corrected, which removed broad delivery delays. One affected printer/scanner lacked proper provisioning on the internal company portal and was re-provisioned so it received the IU_Internal Company Portal configuration and regained network connectivity on the Student WLAN. USB media visibility issues were traced to the device's Dell security USB policy and were remediated as part of the device fix, after which scanning and delivery functioned normally. Separately, an instance where scanned messages were flagged as phishing was caused by an incorrect sender address configured on a Canon ImageRUNNER Advance Dx C3926i; the messages were released from the anti-spam/quarantine and the device's sender address was corrected, which cleared the phishing/quarantine classification and restored delivery to users.

Source Tickets (2)
3. Missing messages due to envelope-from/display-from differences and focused-inbox/diversion interactions
76% confidence
Problem Pattern

Messages expected in users' primary inboxes were routed to Outlook 'Other', marked as Junk/Spam, placed in quarantine, moved to Deleted/Recoverable Items, or displayed an external/phishing warning banner. In many incidents the visible From address differed from the SMTP envelope sender because forwarding, relay, mailing-list software, or third-party services rewrote the envelope-from or used system-generated senders. Users reported that marking messages 'Not Junk' or moving them did not restore delivery, quarantine release requests failed, or external-mail banners continued to appear. Affected systems included Microsoft 365/Exchange anti-phishing and mail-flow controls, Microsoft Quarantine, and Outlook Web and New Outlook clients.

Solution

Specialist teams investigated delivery and banner issues by inspecting the SMTP envelope sender and upstream mail sources rather than the displayed From. They repeatedly found forwarding/relay/mail-flow rules, mailing-list software, or third-party services had rewritten the envelope-from or substituted system-generated senders; this caused messages to be quarantined, routed to Outlook 'Other', classified as Junk/Spam, or to display external-mail/phishing banners despite an internal-looking From address. Support used the true envelope sender, system-generated sender, or upstream mailing-list/ticketing server addresses (for example Freshdesk or Salesforce relay addresses) to locate and release quarantined items and then added those envelope addresses to allow-lists. In cases where messages had been moved to Deleted Items, investigators reproduced the behavior in Outlook Web and New Outlook, saved copies as a precaution, and recovered items from Recoverable Items to return them to users' mailboxes. Where third-party services triggered external-mail/phishing banners while using internal display-from addresses, teams coordinated with IT Security and updated external-mail/phishing-warning policies or mail-flow rules to exclude or internal-whitelist the affected domain or specific senders so internally-branded messages were not flagged. Attempts to release or allow-list initially failed until the forwarding chain or true envelope/system sender was identified. Subject-based whitelisting was not available in the examined platform controls. Systems and examples examined included Microsoft Quarantine, Office 365/Exchange mail flow and anti-phishing controls, Outlook Web and New Outlook clients, and upstream mailing-list management or third-party ticketing systems (Freshdesk, Salesforce).

4. Staged DMARC enforcement rollout for primary domain after third‑party sender fixes
95% confidence
Problem Pattern

Controlled DMARC policy escalation for the organisation's primary domain caused delivery failures for some legitimate third-party‑sent messages. When the DMARC policy was moved from p=quarantine to p=reject, Google Calendar/Gmail‑generated RSVP and appointment confirmation responses began bouncing because those messages were authored with a Google domain in the Header From or otherwise failed DMARC alignment. Outlook‑generated RSVP messages did not exhibit the same failures. Affected systems: DMARC, Gmail/Google Calendar, Outlook and third‑party mail senders.

Solution

The organisation performed a phased DMARC enforcement rollout for the primary domain. After ensuring third‑party senders were configured correctly, SPF/DKIM adjustments for CleverReach were completed first, and the DMARC pct was incrementally increased on scheduled dates (examples: 2023‑09‑11 0%→5%, 2023‑09‑18 5%→10%, 2023‑09‑25 10%→15%, 2023‑10‑09 15%→20%, 2023‑10‑25 20%→25%, 2023‑11‑14 25%→30%, 2023‑12‑06 onward) to move from p=none toward p=quarantine without causing widespread delivery failures. Later, when the policy was advanced from p=quarantine to p=reject, calendar RSVP/confirmation messages generated by Google began to bounce because Google‑authored responses used a Google domain in the Header From or otherwise failed DMARC alignment; Outlook‑generated RSVP messages did not fail because they were sent differently. No technical workaround was implemented to alter Google’s behavior; the team recorded a decision to leave the DMARC policy as configured and accept the observed bounce behavior rather than implement sender‑specific exceptions.

Source Tickets (2)
5. Outbound delivery failures and spam placement from Salesforce / third‑party senders due to missing DKIM/SPF
93% confidence
Problem Pattern

Outbound messages sent from organisation domains via third‑party services (CMS, marketing platforms, transactional services) were rejected, quarantined, flagged as phishing, or delivered to recipients' spam folders; some transactional messages were absent from both Inbox and Spam. Recipient gateways and anti‑phishing systems reported missing DKIM signatures or DKIM/SPF/DMARC failures, and treatment varied across recipient gateways and mail clients. In some recipients (notably Outlook) message display was affected (external images blocked or fonts rendered incorrectly), producing client prompts to download external content.

Solution

Investigations identified missing or incorrect outbound authentication (DKIM and SPF and related DNS records) for organisation domains used by third‑party senders as the root cause. Resolutions performed included obtaining provider‑supplied DKIM values or CNAME records (including cases where the provider generated the signing key), creating and publishing DKIM records, enabling DKIM signing on sender platforms where required (e.g., CMS/provider‑hosted senders), and expanding SPF TXT records to explicitly authorise each third‑party sender (Salesforce/Marketing Cloud, Prowly/Amazon SES, Frontify, SiteFusion and similar services). Additional MX/TXT records were added when providers required DNS verification (including examples involving PowerDMARC). After DNS records propagated, messages that had been rejected, quarantined, or marked as spam (including password‑reset and distribution‑list messages) were delivered instead of being blocked. Persistent Outlook client behaviour (external images blocked at display time) was observed as a separate client display effect alongside the authentication/deliverability issues.

6. Outbound messages quarantined by content/profanity filter (blocked words)
90% confidence
Problem Pattern

An outbound email was held in the organisation's quarantine because the mail/content filter detected a blocked word (mild profanity) in the message text; users received automated quarantine notifications and the message was not delivered.

Solution

The message was released from the quarantine by the IT/Email Administrator. The incident was documented as an automated outbound content/profanity policy; affected users were informed that removing or editing the offending word allowed resending, and that IT could release legitimately blocked messages on request.

Source Tickets (2)
7. Mail bounces caused by disallowed attachment file types and macro‑enabled documents
84% confidence
Problem Pattern

Senders or recipients observed message delivery failures or quarantines caused by recipient mail filters blocking disallowed attachment file types. Symptoms included SMTP bounces such as 550 5.0.350 One or more of the attachments in your email is of a file type that is NOT allowed by the recipient's organization, quarantine notifications stating messages contained a banned file type or Policy violation, and occasional SPF validation error bounces; some quarantines omitted the sender address. Affected paths included Exchange Online/SMTP, Outlook clients, gateway quarantine services and shared or institutional mailboxes. Commonly blocked attachments were executables (*.exe, *.com), legacy Office formats (*.doc, *.xls) and macro‑enabled Office files (*.docm, *.xlsm).

Solution

Investigations reproduced delivery failures and quarantines and traced the root cause to attachment‑type policies enforced by recipients' mail filters (Exchange Online anti‑malware, institutional filtering and gateway spam‑quarantine services). Mail logs and quarantine notifications explicitly referenced blocked attachment types; one case confirmed that message size (observed limit 36,864 KB) was not the cause. Commonly blocked types included executables (.exe, .com), legacy Office documents (.doc, .xls) and macro‑enabled Office formats (.docm, .xlsm); .docx and .zip were sometimes allowed when legacy formats were rejected. Bounce and quarantine messages varied and in addition to 550 5.0.350 often showed Policy violation or SPF validation errors when messages were rejected. In at least one incident quarantines contained malicious attachments that had been spammed to many shared mailboxes and quarantine notifications omitted the sender address, which hindered recipient verification; HelpDesk/IT reviewed quarantined items and logs and confirmed the blocks were correct. Incidents were resolved by delivering content in allowed formats (for example converting problematic Word files to a different Word format or to .docx, or sending compressed archives) or by removing macros; when messages were legitimate, administrators reviewed and released or whitelisted senders or attachments or accepted files via alternative delivery portals such as a Safe Portal. Quarantined items determined to be spam or phishing were discarded and not released.

8. Emails (inbound and outbound) held by quarantine due to flagged URLs or phishing suspicion
93% confidence
Problem Pattern

Inbound or outbound email messages were quarantined, blocked, or routed to recipients' Junk folders by spam/quarantine filters or upstream gateways, causing missing or delayed delivery, per-recipient delivery differences, one-way delivery failures, and account‑confirmation timeouts. Users reported quarantined items missing from tenant mail traces or quarantine consoles, pending‑release entries or unresponsive quarantine UIs, unreadable quarantine previews for encrypted messages (for example in VIPRE/mailanyone), and SMTP bounce errors such as remote ESP '550 ... blocked' for outbound mail. Triggers included URL‑based detections, embedded Base64/SVG content, encrypted or attachment‑wrapped messages, tenant or organization blocklist entries, sender/domain reputation issues, and message content characteristics (excessive punctuation, ALL CAPS, templated content).

Solution

Investigations located affected messages using tenant quarantine searches (Defender/Exchange), Exchange mail traces/transport logs, Threat Explorer, Log Analytics, upstream ESP event logs (for example Amazon SES EmailEvents), and third‑party gateway quarantine consoles and logs (for example VIPRE/mailanyone). Quarantined or blocked items were released or unblocked to restore delivery; when tenant‑UI release actions showed pending or failed states, SOC or tenant administrators performed prioritized manual releases (including releases via VIPRE's quarantine console where applicable). Repeat or business‑critical flows were protected by tenant mitigations such as permanent‑release/allow rules, adding senders/domains to the tenant allowlist, and applying temporary release retention periods to keep released messages accessible during analysis. Tenant blocklist entries and specific blocked URLs were removed after false‑positive confirmation and affected messages were submitted to Microsoft and marked Clean when appropriate. Upstream blocking incidents were investigated using remote gateway bounce data (including SMTP 550 responses) and ESP event logs; remediation included allowlist/whitelisting discussions with remote ESPs when outbound mail was blocked. Duplicate quarantined items were identified as resends or large‑attachment retransmits and both copies were evaluated and released when appropriate. Where recipient‑side spam scoring contributed to delivery failures, message templates and content were reviewed and revised (for example removing excessive punctuation, avoiding ALL CAPS, and personalizing templated content), which correlated with reduced spam scores and improved inbox placement. Recipients were advised to add sending addresses to their personal allowlists when delivery depended on recipient‑level spam algorithms. Encrypted messages sometimes rendered quarantine previews unreadable (observed in VIPRE); these items were confirmed as expected encrypted/sensitive content before release. Phish‑alert escalations included legitimate account‑verification emails that were validated as genuine and closed.

9. S/MIME encrypted replies failing due to outdated/missing external certificates
95% confidence
Problem Pattern

Outlook on Windows users sometimes received S/MIME-encrypted messages but were unable to send encrypted replies or outgoing messages were partially encrypted or failed to send. Symptoms occurred when the sender lacked a valid or trusted S/MIME certificate or trust chain in the Windows certificate store, when the sender's mailbox/device had no S/MIME configuration after migration or provisioning, when the sending address/domain did not have S/MIME provisioned, or when the user's S/MIME certificate was issued by an internal (AD CS) CA that was not trusted by external parties. Affected components included Outlook on Windows (Windows 10/11), the Windows certificate store, S/MIME provisioning, and domain/certificate management systems.

Solution

Multiple root causes were observed and resolved. In cases where outbound encrypted replies failed because the correspondent’s S/MIME certificate or its issuer/root entries were missing or out-of-date in the sender’s Windows certificate store, the issue was resolved after the sender obtained the correspondent’s updated S/MIME certificates (example: VDA/arbeitsagentur.de) and the corresponding issuer/root certificates were installed into the Windows certificate store, restoring normal encrypted replies. In incidents where a mailbox or device had no S/MIME configuration after migration or provisioning, completing S/MIME setup on the user’s mailbox or on a new Windows 11 device enabled encrypted or partially encrypted sending. For users on personal or unmanaged Windows machines, IT-issued S/MIME certificates were delivered from the organization’s AD CS through the SAFE Portal and the user-installed certificate and password restored outgoing encryption capability; these cases also exposed that internally issued (AD CS) certificates were not publicly trusted by external recipients unless the trust chain was present on the device. Finally, when a sending address or domain lacked S/MIME provisioning (for example, the deine-weiterbildung.de address), provisioning S/MIME for that address/domain enabled encrypted sending to the Federal Employment Agency. Affected systems observed across incidents included Outlook on Windows (10/11), the Windows certificate store, AD CS/SAFE Portal distribution, and enterprise domain/certificate provisioning.

10. Spam forwarded to inactive helpdesk address and mischaracterized as organization‑wide incident
90% confidence
Problem Pattern

User received a spam message (sender account@prizewings.com) and forwarded it to it-helpdesk@iu.org asking whether it arrived; the user also reported security/privacy concern and incorrectly indicated the incident affected the entire organization and students. There were no error messages and the forwarded support address was not monitored, resulting in a misdirected spam report.

Solution

Support confirmed that it-helpdesk@iu.org was not active and supplied the correct reporting address (service@iu-it.org). The user was informed not to forward routine spam to IT and was shown that Outlook's right-click "Mark as Junk/Spam" was the appropriate reporting action for that message type. Staff also clarified that routine spam should not be characterized as affecting the whole organization; the user had archived the original message for possible future reference.

Source Tickets (1)
11. Mailbox-level blocking when perimeter filters allow external marketing/spam
86% confidence
Problem Pattern

Internal and shared Exchange/Office 365 mailboxes received unsolicited external marketing, spam, phishing or duplicate messages (often displayed with an “external-mail” banner) despite perimeter spam controls. In some incidents messages bypassed perimeter filtering because they were statically forwarded out of the managed environment; in other incidents inbound delivery failed because recipient accounts were listed on an internal blocklist.

Solution

Investigations identified three mailbox-level delivery problems and the mitigations used. For unsolicited external marketing, spam and phishing that had been delivered despite perimeter controls, engineers either added offending senders to the mailbox-level blocked-senders list (Outlook), which removed messages from users’ inboxes and appeared to aid local spam learning, or added the senders to the organisation’s mail-filtering blocklist / created mail-filtering block rules to stop delivery to shared or department mailboxes. Administrators routinely requested a sample .eml when users could not locate messages; the .eml headers were used to identify the sender and create the appropriate block rule. Users were instructed to delete remaining offending messages and were given the organisation’s anti-spam/reporting route (for example the VIPRE reporting link). Where messages were being statically SMTP-forwarded out of the managed environment (for example into third‑party CRM systems), investigators observed that Microsoft Defender and other perimeter policies did not inspect those forwarded messages and handled incidents by blocking or handling mail at the forwarding destination or by changing forwarding configuration so mail flowed through organisational filtering. For inbound-delivery failures, affected accounts were found on an internal blocklist and were removed/unblocked; inbound delivery resumed. Changes implemented were limited to mailbox blocked-sender lists, the internal blocklist, mail-filtering blocklists or forwarding configuration rather than broad perimeter policy changes.

12. Jungle Mail prevented use of site sender address when site appeared as 'Default Site' and address was not available
90% confidence
Problem Pattern

Users reported inability to send from a desired Jungle Mail sender address (no explicit error codes); the Jungle Mail site displayed as "Default Site" instead of the expected team name and the requested sender e-mail was not available/allowed in the site UI. Affected systems were Jungle Mail and SMTP; symptoms were inability to select or use the intended From address for campaign sends.

Solution

Technicians confirmed the Jungle Mail site mapping (it appeared as "Default Site" in the system) and added the requested sender e-mail (cpod@iu.org) to the Jungle Mail allowed sender list. The user verified sending worked. After a subsequent user request, the site sender was changed to growth@iu.org and the allowed-sender list was updated accordingly.

Source Tickets (1)
13. PDF receipts blocked by automated Microsoft Purview Message Encryption / DLP rule
90% confidence
Problem Pattern

Outgoing messages with attachments (PDF receipts, payment or identifier strings) were automatically encrypted or quarantined by email DLP/classification. Affected users saw Microsoft Purview 'has sent you a protected message' banners with attachments inaccessible inline or received gateway quarantine alerts such as 'contains credit card information'. Recipients were often unable to open messages until they completed the Purview 'Read the message' one‑time‑code flow; false positives occurred during testing, with temporary addresses, and when other identifier patterns (for example, UK NHS‑number‑like strings or PO numbers) matched DLP rules. Affected systems included Exchange Online/Outlook, Microsoft Purview Message Encryption, and external gateway filters (e.g., Fusemail).

Solution

Incidents were traced to automated content‑detection/DLP controls that either applied Microsoft Purview Message Encryption at transport or quarantined outbound messages at an external gateway. Where Purview encryption was applied, messages were confirmed encrypted (not corrupt) and recipients could open attachments by using the Purview 'Read the message' flow and the one‑time code authentication option. Where third‑party gateways quarantined messages (example: Fusemail), affected messages were identified as expected false positives from test data and were released or ignored after confirmation. Behaviour varied by scanning layer (encryption applied at transport/DLP versus quarantine at an external gateway). Several incidents were attributable to non‑PCI detection patterns — for example, one case involved automated classification of content as a UK NHS number (the sender believed purchase‑order numbers were being misclassified), and that ticket was closed with no documented policy change. Temporary/test recipient addresses increased false‑positive risk and frequently explained quarantine/encryption during trials.

14. Bounce-back flood caused by forged envelope-from addresses submitted via public web forms
90% confidence
Problem Pattern

Multiple unexpected bounce‑back notifications arrived in a public inbox (customerservices@...), often referencing non‑existent sender addresses (for example rsilva@libf.ac.uk). Notifications included repeated/large bounce messages and attachments with no matching legitimate outbound sends or error codes. Activity coincided with high‑volume web form submissions and recipients were unable to locate corresponding sent messages or responsible internal accounts.

Solution

Investigation of mail headers and web‑form submission logs traced the bounce notifications to automated/spoofed submissions through the site’s public web forms that used forged/non‑existent envelope‑from addresses. The team confirmed there were no matching internal accounts or legitimate sends and classified the events as external spam/hacking attempts rather than mailbox compromise. The incident was resolved by documenting the origin and treating the incoming bounces as non‑legitimate, with monitoring retained on the affected inbox and web‑form logs for recurrence.

Source Tickets (1)
15. External sender blocked by organizational forwarding restriction when sending to helpdesk addresses
92% confidence
Problem Pattern

Messages originating from external senders were not delivered or forwarded when addressed to specific internal mailboxes or downstream processors (examples: helpdesk inboxes, invoice mailbox feeding an OCR pipeline). Senders either received non-delivery/bounce notifications or messages silently failed to appear, frequently without a specific SMTP error code. Affected components included inbound SMTP/mail flow, mailbox acceptance and forwarding rules, spam/security filtering, and downstream automated processors or third-party intake tools.

Solution

Investigators confirmed the affected messages originated from external senders and that delivery failures were caused by mailbox acceptance/forwarding restrictions or misconfigured forwarding rules. Two resolution patterns were recorded. In cases where organisational policy explicitly disallowed forwarding or acceptance of mail from one external address to another (for example certain helpdesk addresses), the incident was closed administratively by informing senders of the policy and directing them to the central intake channel. In cases where mailbox-level rules or forwarding configurations were blocking external-origin messages (for example invoices forwarded to an OCR tool), the issue was resolved by reviewing the target mailbox and account configuration, removing or correcting rules that prevented external messages from being accepted or forwarded, and monitoring mail-flow logs to confirm messages reached the downstream system. Where spam/security filtering contributed, the corrective changes to rules allowed external messages to be delivered to the intended mailbox or processing pipeline.

16. Salesforce outbound blocked when sender address remained unverified
90% confidence
Problem Pattern

Users were unable to send outbound messages from Salesforce; send attempts failed with a recurring error dialog and outgoing emails were blocked when using a corporate sender address. The issue appeared only for messages sent from Salesforce to applicants/externals and persisted until the sender address verification state changed.

Solution

The case was escalated to the specialist team, which triggered the platform's sender verification message to the user's email address. The user completed the verification by confirming the verification email, and after the sender address was marked verified the error no longer occurred and Salesforce was able to send the emails successfully.

Source Tickets (1)
17. Scoped blocking of legacy proctoring domains for student mailboxes
75% confidence
Problem Pattern

Students were receiving unwanted automated 'No‑show' and notification emails from legacy proctoring providers (meazurelearning.com, later proctoru.com) after a vendor rollout. The messages reached student inboxes (and occasionally spam/quarantine) and caused confusion; the change needed to take effect on 2025-06-23 06:00. The request required blocking inbound mail from those domains for student addresses while not impacting employee mailboxes. Affected systems included Exchange Online mail flow, Microsoft Defender anti‑spam, tenant allow/blocklist, and quarantine.

Solution

The team blocked both meazurelearning.com and proctoru.com for the student address space by creating scoped controls that applied only to student mailboxes. An Exchange Online mail flow (transport) rule was implemented to match messages from the two sender domains and to reject/quarantine inbound mail when the recipient address belonged to the student domains (iu.org and iu-study.org); employee mailboxes were excluded by scoping conditions. The domains were also added to the Microsoft 365 tenant Allow/Blocklist as blocked sender domains and Defender for Office 365 anti‑spam policy settings were adjusted to quarantine remaining hits. The change was scheduled and activated on 2025‑06‑23 06:00 and administrator release paths were left available for any false positives.

Source Tickets (1)
18. Outbound delivery failures caused by recipient listed on internal block‑list
90% confidence
Problem Pattern

User outbound messages failed with a non‑delivery report ("wasn’t possible to deliver it"); repeated sends and workstation restarts did not help. Mail transport logs showed the same single recipient account was being blocked and entire outbound messages were rejected. Affected systems included the corporate mail delivery/transport and internal recipient block‑list.

Solution

The incident was escalated to mail specialists who reviewed transport logs and internal block‑list entries. They identified that the recipient account had been mistakenly placed on an internal recipient block‑list, removed the recipient from the block‑list, and confirmed the sender could resend the message. Normal outbound delivery resumed and the ticket was closed.

Source Tickets (1)
19. Application SMTP authentication interruption causing outbound mail failures and blocked source IPs
60% confidence
Problem Pattern

An internal application (simovative-care-sbm) stopped authenticating to the MX1 Postfix SMTP server for multiple days, producing a gap in SASL LOGIN activity and resulting in no outbound mail from the Care system. Postfix logs showed the last successful login on Aug 1, then no logins until Aug 6. Fail2ban recorded multiple blocked IPs around the same period, and delivery attempts from the Care system failed or never reached MX1.

Solution

Mail delivery was restored after the Care system re-established SASL authentication to MX1 and the source IP used by simovative-care-sbm was removed from fail2ban's blocklist / allowlisted. Postfix resumed accepting SMTP logins for simovative-care-sbm (sasl_method=LOGIN, sasl_username entries appeared again) and outbound message flow from the Care system returned to normal.

Source Tickets (1)
20. Third‑party vendor global suppression list blocking domain recipients (DotDigital)
95% confidence
Problem Pattern

Emails and form-based sends hosted by DotDigital were being suppressed for recipients at iu.org because DotDigital had iu.org on its global suppression list. The symptom was nondelivery/suppression to IU addresses from DotDigital-hosted forms and marketing sends, with no explicit SMTP bounce code presented to IU.

Solution

DotDigital support confirmed iu.org was on their global suppression list. Removal required confirmation from the domain owner: IU IT (domain owner for iu.org) needed to contact support@dotdigital.com to confirm ownership/authorization. Once DotDigital received that confirmation they would remove iu.org from the global suppression list and allow sends to resume. At the time of the ticket, the domain-owner confirmation and removal had not yet been completed.

Source Tickets (1)
21. Reported non‑receipt where inbound mail was delivered and not blocked by spam filters
92% confidence
Problem Pattern

User reported missing emails from vimeo.com to a shared mailbox (digital@libf.ac.uk) with no bounce codes; user suspected spam filters or quarantine. Affected systems were the inbound mail pipeline, spam filter/quarantine, and the shared mailbox. Tickets contained no initial evidence of delivery failure or filter actions.

Solution

Mail and spam‑filter logs were reviewed for messages from vimeo.com. Two recent messages from Vimeo Support (both titled '[Vimeo] Re: Subscription receipt') were located and had been successfully delivered to digital@libf.ac.uk. The user was informed that the messages were not being blocked by the perimeter filters and no whitelist or filter changes were required.

Source Tickets (1)
22. Missing inbound mail caused by incorrect recipient address (misaddressed messages)
95% confidence
Problem Pattern

User did not receive expected mail from dse@eumail.docusign.net and reported missing DocuSign deliveries without bounce messages. Affected systems included DocuSign outbound, the VIPRE perimeter filter, and the intended corporate mailbox. Investigation indicated the messages were sent to the wrong recipient address, causing non‑receipt.

Solution

The investigation showed the DocuSign messages had been addressed to an incorrect email. The recipient address was corrected and the messages were replayed/resent through VIPRE to the proper mailbox, after which delivery was restored.

Source Tickets (1)
23. Unreadable rights‑protected (AIP/Microsoft Rights) email displayed as 'rights protected message' and not viewable
35% confidence
Problem Pattern

User received an email in Outlook that displayed as a 'rights protected message' (Azure Information Protection / Microsoft Rights Protection) and could not be opened or viewed; the message showed only an attachment size, lacked subject/from details and error codes, and the recipient was unsure whether it was safe to open.

Solution

Support examined the item and identified it as a rights‑protected message but was unable to open or display its contents from the user's Inbox. No technical remediation or decryption steps were recorded in the ticket. Support advised treating unexpected rights‑protected messages as potential phishing and requested the mailbox location plus subject and sender metadata for further investigation.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X