Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Reply All handling

Posted on 2011-02-18
4
Medium Priority
?
309 Views
Last Modified: 2012-05-11
I'm sending an email from a nonexistent address.  When the user replies, they use the reply-to field.

I'm curious if I can control how a client handles a  "reply all".

Google Apps uses the from and reply-to fields for a "reply all".

Yahoo mail uses only the reply-to for a "reply all"

Outlook 2007 uses the reply-to and the To files for a "reply all".  

Can I force clients to use only the reply-all?
0
Comment
Question by:md168
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 6

Expert Comment

by:t-max
ID: 34929811
Why not send the email directly from the address in "reply-to"? Anyway you give them a way to contact you...
0
 

Author Comment

by:md168
ID: 34930468
Because the real reply is a randomly generated email address.  The belief is that if people see it, then it might cause more confusion the problem of people clicking "reply all".
0
 
LVL 6

Accepted Solution

by:
t-max earned 2000 total points
ID: 34932331
So why not use instead the real email address in the "from" field?
There's no way for you to control how each email client (Outlook, Thunderbird, etc.) or web mail site (Gmail, Yahoo!, etc.) populates the TO: and CC: fields after you hit "Reply All".
The standard for email handling doesn't specify any "flag" to control a client behavior, so you won't be able to do what you want. Here you have some talking about the new RFC  2822 standard related to setting "reply-to", in case you are bored: http://woozle.org/~neale/papers/reply-to-still-harmful.html
0
 

Author Closing Comment

by:md168
ID: 34935386
This is what I expected.  I will ask my developers to change the From, but I don't think management will allow it.  I will read the link you send.  thanks
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
When you’re making plans to join the modern business race, you should analyze various details that may affect your results. Nowadays, millions of businesses are trying to grow into established and appreciated professional enterprises.
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question