This article explains why messages can be held due to Suspicious Message Structure, and is intended for Administrators.
Introduction
If a message is flagged as having a Suspicious Message Structure, it indicates that something about the construction of the message violates the RFCs that define how an email should be formed.
We check for Suspicious Message Structure because such messages could contain dangerous contents, e.g. malware, in the form of attachments.
- Messages that trigger the Suspicious Message Structure check are placed on Administrator hold. This applies to benign as well as dangerous messages with Suspicious Message Structure, as a precaution.
-
An email may be sent to the intended recipient of an email when the message is held due to Suspicious Message Structure, however, only an Administrator can take action as a result of this notification as detailed below.
- Administrators can release an administrator hold message if they've determined it to be safe. The message cannot be viewed in the End User's hold queue. Once released, the message is delivered to the recipient.
Hold Reasons
| Reason | Details |
| Mail formatting issues. |
The email cannot be broken apart, making it hard to parse or view. The contents cannot be identified, so the message is put on Administrator hold. Examples:
|
| Mail format that should not be sent over the internet. |
Message that has a WINMAIL.DAT attachment with multiple formatting irregularities.
|
| Incorrect encoding of message. |
|
| Mimecast part count exceeded. |
|
Bypass Options
Examples of when you may need to bypass this policy:
- An external sender is sending messages with over 250 attachments or message parts, or they are sending from a Mail Transfer Agent (MTA) that is sending the messages in a Binary format.
You can make a Message Passthrough policy that will allow the messages to bypass these particular issues and allow the message through to the recipient. - Messages with Suspicious Message Structure check are placed on Administrator hold, but are believed to be safe. You can bypass these by using a Message Passthrough policy.
Please ensure that you have reviewed the Message Passthrough policy article, as using this will prevent Mimecast from adding any tagging to the message.
Comments
Please sign in to leave a comment.