Infrastructure

Successful deliverability depends on a strong foundation. Email infrastructure is a core element. A properly constructed email infrastructure includes multiple components - namely domain(s) and IP address(es). These components are like the machinery behind the emails you send and they are oftentimes the anchor of sending reputation. Deliverability consultants ensure that these elements are set up properly during implementation, but due to the reputation element, it is important for you to have this basic understanding.

Domain setup and strategy domain-setup-and-strategy

Times have changed, and some ISPs (like Gmail and Yahoo) now incorporate domain reputation as an additional point when it comes to attaching email reputation to a sender. Your domain reputation is based on your sending domain instead of your IP address. This means that your brand takes precedence when it comes to ISP filtering decisions.

Part of the onboarding process for new senders on Adobe platforms include setting up your sending domains and ensuring that your infrastructure is established properly. You should work with an expert on what domains you plan to use in the long term. Here are some tips that shape a good domain strategy:

  • Be as clear and reflective of the brand as possible with the domain you choose so that users don’t incorrectly identify the mail as spam. Some examples are newsletter.foo.com, receipts.foo.com, and so on.
  • You shouldn’t use your parent or corporate domain as it could impact the delivery of mail from your organization to ISPs.
  • Consider using a subdomain of your parent domain to legitimize your sending domain.
  • Separate your subdomains for Transactional and Marketing message categories. This will help your email traffic flow on a more reliable basis as ISPs look for this sending method, which is a known email best practice and is highly recommended.

IP strategy ip-strategy

It is important to form a well-structured IP strategy to help establish a positive reputation. The number of IPs and setup varies depending on your business model and marketing goals. Work with an expert to develop a clear strategy to start off right. Consider these things that are important to note:

  • Too many IPs can trigger reputation issues as it is a common tactic of spammers to snowshoe, which is a tactic used by spammers where traffic is spread across many IPs to maximize the delivery of spam mail. Even though you’re not a spammer, you might look like one if you use too many IPs, especially if those IPs haven’t had any prior traffic.
  • Too few IPs can cause throughput issues and potentially trigger reputation issues. Throughput varies by ISP. How much and how quickly an ISP is willing to accept is typically based on their infrastructure and sending reputation thresholds.
  • Separating traffic for messaging types is key. It is important to, at a bare minimum, separate marketing and transactional mail on separate IP pools.
  • Depending on your mail strategy, it may also be advisable to separate different products or marketing streams on different IP pools if your reputation is drastically different. Some marketers also segment by region. Separating the IP for traffic with a lower reputation will not fix the reputation issue, but it will prevent issues with your “good” reputation email deliveries. After all, you don’t want to sacrifice your good audience for a riskier one.

Feedback loops feedback-loops

Behind the scenes, Adobe platforms are processing data regarding bounces, complaints, unsubscribes, and more. The setup of these feedback loops is an important aspect to deliverability. Complaints can damage a reputation, so you should email addresses that register complaints from your target audience. It’s important to note that Gmail doesn’t provide this data back. List unsubscribe headers and engagement filtering are especially important for Gmail subscribers, who now comprise the majority of subscriber databases.

Authentication authentication

Authentication is the process that ISPs use to validate the identity of a sender. The two most common authentication protocols are Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). These are not visible to the end user but do help ISPs filter email from verified senders. Domain-based Message Authentication Reporting and Conformance (DMARC) is gaining popularity, although its policies aren’t yet incorporated by all ISPs in their reputation systems.

SPF

Sender Policy Framework (SPF) is an authentication method that allows the owner of a domain to specify which mail servers they use to send mail from that domain.

DKIM

Domain Keys Identified Mail (DKIM) is an authentication method that is used to detect forged sender addresses (commonly called spoofing). If DKIM is enabled, it allows the receiver to confirm if the sender is authorized to send mail from that domain.

DMARC

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an authentication method that allows domain owners the ability to protect their domain from unauthorized use. DMARC uses SPF or DKIM or both to allow a domain owner to control what happens to mail that fails authentication: delivered, quarantined, or rejected.

Product specific resources

Campaign

Additional resources

  • Learn more on SPF, DKIM, and DMARC authentication methods in this section.
  • Learn more on increasing your email reputation with IP warming in this section.
recommendation-more-help
ce4a522f-06e7-4189-95bc-98ae01b1a1ec