Office 365 – Managing Spam in Junk E-mail Folder and Block/Allow Senders Lists
Description: The University has migrated to Office 365, along with this upgrade all Spam filtering is done by Microsoft. The new spam scanning service does not have a web accessible interface that will allow the user to control spam. Microsoft uses a sender base reputation and scores the domains. Based on these scores the domains are […]
» Subjects: , , » Tags: , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

Caught a Phish?
Description: First, make sure the phish isn’t just spam. If it is a phishing message, use UNC’s Phish Alerts page to see if it has already been reported. If it hasn’t been reported yet, please forward the message as an attachment to phish@unc.edu.
» Subjects: , » Tags: , , ,

How to forward suspect Phishing & SPAM Email Messages for Evaluation
Description:   What is a Phishing or SPAM Email? Phishing is email that attempts to capture login credentials, sensitive or financial information, or both.  In some cases phishing is an attempt to collect money.  Generally, phishing emails attempt to convince users to unknowingly surrender information by providing an attachment for the user to open or by […]
» Subjects: , , , » Tags: , , , , , ,

How do I opt-in to the UNC Spam Filtering Service?
Description: All UNC ITS email users are opted-in to the UNC Spam Filtering Service by default. For information on how to use this service, see the document for the UNC-Chapel Hill Spam Filtering Service, and the UNC-Chapel Hill Spam Filtering Service FAQ
» Subjects: , » Tags: ,

What are the best practices to use to prevent someone from receiving spam?
Description: Introduction Although there are many opinions as to what spam is, there is some consensus that spam can be considered to be unsolicited, bulk commercial e-mail. Spam has evolved from its beginnings as unsolicited commercial-based postings to usenet newgroups to current sophisticated attempts to steal users’ identities via phishing and or to market illicit goods […]
» Subjects: , » Tags: ,

Why can’t someone in Brazil using an ISP in Taiwan send messages to my UNC e-mail account?
Description: In accordance with best practices and industry standards, UNC e-mail administrators have taken an aggressive stance in removing spam from the UNC e-mail system. We have absolutely nothing against your mom, colleague, or friend. UNC-Chapel Hill reserves the right to reject mail identified as spam without providing notification to the recipient. In addition, legitimate e-mail […]
» Subjects: , » Tags: , ,

Why didn’t I receive an e-mail message I was expecting?
Description: Various possible reasons include: The message contained a virus and was rejected. In addition to automatically rejecting the most notorious virus attachments, e.g. .scr and .pif files, we maintain current virus definition signature files on the UNC-Chapel Hill incoming mail servers to filter out viral messages. The message was sent from a blocked domain and […]
» Subjects: , » Tags: , ,

What are the Junk Mail Controls in Thunderbird?
Description: Introduction Thunderbird has a built in feature called Junk Mail. It automatically detects incoming email messages that appear to be junk mail (also known as spam), and then can perform a number of configurable actions on those messages. Messages that Thunderbird thinks are junk will display a junk mail icon. At first, you must train […]
» Subjects: , » Tags: , ,

What is e-mail address obfuscation?
Description: Introduction E-mail address obfuscation is the practice of concealing your e-mail address from spammers or harvesters while maintaining the ability to freely publish your e-mail address to publicly-accessible electronic forums. One tool that spammers use to collect e-mail addresses are harvesters. Harvesters are automated programs that crawl webpages and record email addresses that they find […]
» Subjects: , » Tags: ,