Rule that will trash undeliverables messages caused by spoofing spammers

Posted on 2007-10-03
Last Modified: 2008-01-09
Hello Experts!

I am looking for asssistance creating a rule in Outlook that will trash undeliverable emails that arrive in my catchall account, due to spammers spoofing my domain.

I have a handfull of valid email addresses so my intent is to check the "To" field and if the recepient is not one of my valid accounts then check the subject for the word undeliverable - if the recepient is unknown the the subject includes "undeliverable, I'd like to trash the email.
Question by:AnimatorOne
    LVL 6

    Expert Comment

    The key to any rule is figuring out the info that will be the same for all the messages you want to act on and not false positive ofr ones you want to keep.  So, depending on your responses, you may have a string or word in the subject of the rejections that identifies it as an undeliverable that was spammy and not legit.
    If you can identify that, then in outlook:
    Tools->Rules and Alerts->New Rule
    Choose the "Move messages with specific words in the subject to a folder"
    choose the words, choose deleted items as the folder.


    Author Comment

    Thank you for the comment. Checking the subject line for the word "undeliverable" and moving the message to the deleted items is simple enough. The challenge with this rule is in allowing the word "undeliverable" in the subject line, if the "To" field is one of our 10 working email addresses.
    LVL 6

    Accepted Solution

    In the rules wizard, the 3rd step is to set exceptions to the rule.  There you can exempt the known good addresses.

    If that doesn't work, you could do a 2 rule situation, in which the undeliverables are moved to a folder for you to check out.  Then a 2nd rule that acts on that folder that moves the ones not to the known good addresses to the trash.

    Author Comment

    Good job! Step 3 it was... if I was only a little more patient, I would have got to it!

    Thank you very much!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    If you have never had your Outlook crash or suddenly lose messages, appointments, etc. you are fortunate. No matter how carefully you monitor your system, those things WILL happen, and recovering your data from a backup is not always possible, wh…
    Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
    Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now