Office 365 – Managing Spam in Junk E-mail Folder and Block/Allow Senders Lists
Description: The University has migrated to Office 365, along with this upgrade all Spam filtering is done by Microsoft. The new spam scanning service does not have a web accessible interface that will allow the user to control spam. Microsoft uses a sender base reputation and scores the domains. Based on these scores the domains are […]
» Subjects: Email, HeelMail, Office 365 » Tags: Allow, block, Office 365, Senders, spam
Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: Email, Security » Tags: junk mail, Phish, Phishing, spam
How to forward suspect Phishing & SPAM Email Messages for Evaluation
Description: What is a Phishing or SPAM Email? Phishing is an email that attempts to capture login credentials, sensitive or financial information, or both. In some cases, phishing is an attempt to collect money. Generally, phishing emails attempt to convince users to unknowingly surrender information by providing an attachment for the user to open or […]
» Subjects: Email, Exchange, HeelMail, Spam and Phishing » Tags: Mac Mail, outlook, OWA, Phish, Phishing, spam, Thunderbird
How do I opt-in to the UNC Spam Filtering Service?
Description: All UNC ITS email users are opted-in to the UNC Spam Filtering Service by default. For information on how to use this service, see the document for the UNC-Chapel Hill Spam Filtering Service, and the UNC-Chapel Hill Spam Filtering Service FAQ
» Subjects: Email, Spam and Phishing » Tags: filter, spam
What are the best practices to use to prevent someone from receiving spam?
Description: Introduction Although there are many opinions as to what spam is, there is some consensus that spam can be considered to be unsolicited, bulk commercial e-mail. Spam has evolved from its beginnings as unsolicited commercial-based postings to usenet newgroups to current sophisticated attempts to steal users’ identities via phishing and or to market illicit goods […]
» Subjects: Email, Spam and Phishing » Tags: Best Practice, spam
Why can’t someone in Brazil using an ISP in Taiwan send messages to my UNC e-mail account?
Description: In accordance with best practices and industry standards, UNC e-mail administrators have taken an aggressive stance in removing spam from the UNC e-mail system. We have absolutely nothing against your mom, colleague, or friend. UNC-Chapel Hill reserves the right to reject mail identified as spam without providing notification to the recipient. In addition, legitimate e-mail […]
» Subjects: Email, Spam and Phishing » Tags: Mail Client, spam, Web Interface
Why didn’t I receive an e-mail message I was expecting?
Description: Various possible reasons include: The message contained a virus and was rejected. In addition to automatically rejecting the most notorious virus attachments, e.g. .scr and .pif files, we maintain current virus definition signature files on the UNC-Chapel Hill incoming mail servers to filter out viral messages. The message was sent from a blocked domain and […]
» Subjects: Email, Spam and Phishing » Tags: Junk Folder, Mail Client, spam
What are the Junk Mail Controls in Thunderbird?
Description: Introduction Thunderbird has a built in feature called Junk Mail. It automatically detects incoming email messages that appear to be junk mail (also known as spam), and then can perform a number of configurable actions on those messages. Messages that Thunderbird thinks are junk will display a junk mail icon. At first, you must train […]
» Subjects: Email, Spam and Phishing » Tags: Mozilla, spam, Thunderbird
What is e-mail address obfuscation?
Description: Introduction E-mail address obfuscation is the practice of concealing your e-mail address from spammers or harvesters while maintaining the ability to freely publish your e-mail address to publicly-accessible electronic forums. One tool that spammers use to collect e-mail addresses are harvesters. Harvesters are automated programs that crawl webpages and record email addresses that they find […]
» Subjects: Email, Spam and Phishing » Tags: Phishing, spam
How can I get an email domain or host removed from the spam block list?
Description: Introduction In an effort to reduce the amount spam received by users of the UNC-CH central email system, ITS utilitizes email block lists to block email domains and individual hosts known to be sources of spam from sending messages to @email.unc.edu email addresses. When email messages are sent from these blocked domains or hosts, the […]
» Subjects: Email, Spam and Phishing » Tags: Block List, spam