This site requires JavaScript to be enabled
An updated version of this article is available

How the University Blocks Unwanted Mail

13 views

20.0 - Updated on 2024-04-01 by Matt Anderegg

19.0 - Updated on 2024-03-04 by Christopher Parker

18.0 - Updated on 2023-09-27 by Stephen Walker

17.0 - Updated on 2023-03-13 by Robert Hilker

16.0 - Updated on 2022-09-26 by Matt Anderegg

15.0 - Updated on 2021-08-26 by Chase M

14.0 - Updated on 2020-05-06 by Chase M

13.0 - Updated on 2019-05-09 by Chase M

12.0 - Updated on 2019-05-08 by Chase M

11.0 - Updated on 2019-05-07 by Donald Nash

10.0 - Updated on 2019-05-07 by Chase M

9.0 - Updated on 2019-06-22 by Chase M

8.0 - Updated on 2019-05-06 by Chase M

7.0 - Updated on 2019-05-03 by Chase M

6.0 - Updated on 2019-05-03 by Chase M

5.0 - Updated on 2019-06-22 by Chase M

4.0 - Updated on 2019-05-03 by Chase M

3.0 - Updated on 2019-04-30 by Chase M

2.0 - Updated on 2019-01-18 by Allen Hernandez

1.0 - Authored on 2017-10-25 by Jennifer Plunkett

 

ITS manages the Mail Filtering Service, which filters unwanted e-mail from many UT Austin email services. Although ITS anti-spam and anti-phishing solutions are very effective, it is impossible to detect all unwanted e-mail. While ITS adjusts the hardware and software technologies in use on campus to adapt to new spamming and phishing techniques, you may occasionally see unwanted e-mail appear in your inbox.

If the Mail Filtering Service is unable to conclusively determine whether a message is spam or otherwise malicious, the message is sent with one of the following tags: [UTEXAS: SUSPECTED SPAM] or [UTEXAS: POSSIBLY MALICIOUS CONTENT] attached to the beginning of the subject line and a warning is added to the top of the message. This will allow you to determine whether the message is legitimate. You can also create a rule or filter based on the altered subject line to automatically mark these messages as unwanted email in the future.

 

Please be aware that it is possible, for legitimate e-mail to be tagged as spam or as being malicious.

Given this, it is important that you consider reviewing or searching the folder where these tagged e-mails are kept in the event you are missing e-mail that you expected to receive.