Solved

SMTP BULK MAIL - DROP FOLDER ASSUMPTIONS

Posted on 2009-07-03
3
288 Views
Last Modified: 2013-11-30
I am sending bulk mail using CDO through an SMTP server on the local machine.  It's all setup with reverse dns and a fully qualified domain.

Is it safe to assume that any message in the mailroot/drop folder is undeliverable due to no mailbox / server and so i should remove from my mailing list?  I'm thinking of scripting a file system object to read the folder and look for the to tag then remove it from my list.

Any thoughts?
0
Comment
Question by:andrewmilner
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 15

Expert Comment

by:plimpias
ID: 24773743
No that is not the case, there are several reasons why it would be delivered to the drop folder not just because the mailbox doesn't exist. You can delete the contents of the folder with out causing any damage.
0
 

Author Comment

by:andrewmilner
ID: 24776285
what other reasons would there be for the message being in there?
0
 
LVL 15

Accepted Solution

by:
plimpias earned 500 total points
ID: 24777535
The drop folder is used when local delivery takes place, otherwise it is qued for delivery to the outside world. If you smtp server is authoritive for a specific these domains then it woudl be safe to assume that either the name was typed in wrong, the mailbox doesn't exist, is disabled, or it doesn't have permission to deliver to it.
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
When you’re making plans to join the modern business race, you should analyze various details that may affect your results. Nowadays, millions of businesses are trying to grow into established and appreciated professional enterprises.
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question