Thanks for your reply Jarland, I have been contacted privately.
The procedure you described is the one we always follow but this time it’s been
different and all of the requests have been denied at all levels for a couple
of weeks.
This morning I see that a few IP addresses have been mitigated, u
Michael Peddemors via mailop (Mo 14 Nov 2022 23:52:18 CET):
> Not going to send the whole headers..
> This should be enough for the MS people to investigate.
Maybe I'm missing the point…
How can you tell that is was the sender who *forgot* to remove it?
Maybe it was the recipient (or an intermed
Not going to send the whole headers..
This should be enough for the MS people to investigate.
-- Michael --
Received: from CO1NAM11FT087.eop-nam11.prod.protection.outlook.com
(2603:10b6:303:dd:cafe::9) by MW4PR03CA0308.outlook.office365.com
(2603:10b6:303:dd::13) with Microsoft SMT
Just to be sure because I didn't see you mention it, make sure you've
contacted them via the form I often see linked so many different ways
but I'll link as this:
https://support.microsoft.com/en-us/getsupport?oaspworkflow=start_1.0.0.0&wfname=capsub&productkey=edfsmsbl3&locale=en-us&ccsid=63616
Hello,
Does anybody know any mail filter or plugin to Postfix MTA that sends
TLS-RPT reports to *mailto* or *https* RUA tags? For the DMARC report,
there are a couple of milters in *Rspamd* and *opendmarc* but I could not
find any such option for the TLS-RPT one.
Thanks.
Regards,
Muyeed
_