LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Integrating Microsoft Defender with Keepnet Phishing Reporter
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Email Delivery Error Types
  • 1. Bounce Errors
  • 2. Dropped Errors
  • Handling Email Training Enrollment for Users Without Initial Inbox Setup in Microsoft Office 365

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Miscellaneous
  3. Whitelisting

Understanding Email Delivery Errors

This document provides an overview of the common issues related to the non-delivery of training emails sent to users. It is designed to help system users understand the error messages they may encounter, specifically focusing on the "bounce" and "dropped" statuses.

Email Delivery Error Types

1. Bounce Errors

A "bounce" error occurs when an email is returned to the sender because it could not be delivered to the recipient. Bounces are classified based on the nature of the problem that caused the non-delivery.

Common Bounce Error:

  • 550 5.1.1 Recipient Address Rejected: User Unknown

This error signifies that the recipient's email server has permanently rejected the message because the specified email address does not exist on the recipient server. This is a common issue when the email address is misspelled, outdated, or the recipient's mailbox has been deleted.

Examples:

Delivery Message
Explanation

550 5.7.129 RESOLVER.RST.RestrictedToRecipientsPermission

The sending email address is not permitted to email the recipient, possibly due to a whitelist or exclusive permissions setting

550 5.7.1 TRANSPORT.RULES.RejectMessage

The email was rejected due to an organization's policy, which might be a rule set to prevent certain types of emails from being received

550 5.7.134 RESOLVER.RST.SenderNotAuthenticatedForMailbox

The sender's identity could not be verified by the recipient's server, necessary for mail delivery

554 5.4.14 Hop count exceeded

The email was caught in a routing loop and exceeded the allowed number of transfers between servers

554 5.2.2 mailbox full

The recipient's email inbox is full and cannot accept new messages until space is freed

Administrative prohibition - envelope blocked

The email was prevented from delivery by a policy, likely as a security measure against spam or unauthorized content

550 5.1.1: The email account that you tried to reach does not exist

The email address you're trying to send a message to does not exist or is misspelled

550 5.1.1: Recipient address rejected: User unknown

The email server could not deliver the message because it couldn't find a user with the email address

The email server receiving your message has rejected it because it refuses to relay the message to the intended recipient's email address. The server may be configured to only relay emails for certain domains or to only accept emails for local users

Error dialing remote address: dial tcp 149.92: i/o timeout

This error indicates that there was a timeout while attempting to establish a TCP connection. This error commonly occurs due to network issues, such as:

the remote server being unreachable or offline, network congestion or connectivity problems.

These errors indicate that the sending server is trying to relay an email through the recipient's email server without proper authorization. This can occur if the sender's email server is not allowed to send emails on behalf of the email address it is using.

Handling Errors

To minimize these errors, ensure that:

  • Do not sync services accounts which are unlikely manned such as donotdelete@example.com, noreply@domain.com, etc.

  • Check emails for spelling mistakes or formatting issues

  • Check for any network issues or firewalls blocking the connection.

2. Dropped Errors

"Dropped" errors occur when the email server has stopped attempting to deliver an email after previous attempts resulted in a bounce. This usually happens when the email address has been flagged from prior bounce records, and the server opts not to waste resources on future attempts.

Common Dropped Error:

Bounced Address

This status is given when an email address has previously been marked as bounced, and further emails to this address are automatically dropped without attempting delivery. Examples:

  • "Email to user3@domain.com dropped: previously bounced address"

  • "Email to person4@website.org dropped: bounced address"

  • "Email to info@company.net dropped: bounced address"

Handling Errors

To minimize these errors, ensure that:

  • Email addresses are collected accurately and verified at the point of entry.

  • Regular updates and checks are performed on your email lists to remove outdated or incorrect addresses.

  • Utilize double opt-in methods where recipients must confirm their email addresses, reducing the chances of typing errors.

Handling Email Training Enrollment for Users Without Initial Inbox Setup in Microsoft Office 365

If a company uses Microsoft Office 365, they can set up a user account that doesn't initially have an email inbox, like "user2@company.com". This account details can then be automatically synchronized with Keepnet's Target Users database using SCIM (System for Cross-domain Identity Management).

Here's what happens next:

  1. Automatic Training Enrollment: As soon as Keepnet detects this new user in the company's list, it tries to send a training email. However, because this user doesn't have an email inbox set up yet, the attempt to send the training email fails.

  2. Manual Training Enrollment: Later on, when a system user manually tries to enroll the same user in training, the email is successfully delivered. This success occurs because, by this time, the system administrator has created an inbox for that user.

In simple terms, if the user doesn't have an email inbox at first, Keepnet's automatic email will fail. But if the inbox is set up later, any following attempts to send emails will succeed.

Suggested Solution

To avoid the issue of training emails failing due to no inbox being set up initially, we strongly suggest adjusting the settings to "Automatically enroll new users in target group: next day" rather than "the same day". This delay allows time for the inbox to be established, ensuring that training emails are successfully delivered.

Summary

By implementing this adjustment, companies can enhance the effectiveness of their training programs and ensure smooth communication workflows within Microsoft Office 365 environments.

PreviousKeepnet Tools Whitelisting GuidelinesNextTracking Email Opens in Phishing Simulations

Last updated 1 year ago

Was this helpful?

554 5.7.1 : Relay access denied

The best way to reduce not delivery is across all your security solutions

If you notice one of these errors, please try resending the email to the user

💫
Whitelisting
user3@website.org
following the steps on this page