Email Security Test Domain

📧 Why did I receive an email from this domain?

This domain is part of the Net Reaction Small Business Security email configuration testing service.

Someone at your organization requested an Email Security Test, which sends a series of test emails to verify that your email provider is properly filtering malicious messages.

⚠️ This is NOT actual spam

This test was explicitly requested by a user at your organization. The email was designed to look like spam to test your content filters.

🔍 What does this test check?

Test #7: Spam Content Filtering

This test checks whether your email provider uses content-based spam filtering - looking at the actual words and patterns in an email, not just authentication.

The test email was technically well-authenticated (valid SPF, DKIM, DMARC) but contained classic spam trigger content:

🎉 CONGRATULATIONS! YOU'VE BEEN SELECTED! 🎉

URGENT ACTION REQUIRED - LIMITED TIME OFFER!!!

Act NOW to claim your EXCLUSIVE prize!

CLICK HERE IMMEDIATELY to verify your account!

(This is what our test email looked like)

If you received this email in your inbox:

Your spam filter may need tuning. Emails with obvious spam patterns should be filtered even if they pass authentication checks.

🚩 Common Spam Triggers

Our test email included several classic spam patterns that content filters should catch:

URGENT!!!
ACT NOW
LIMITED TIME
CONGRATULATIONS
YOU'VE BEEN SELECTED
CLICK HERE
EXCLUSIVE OFFER
VERIFY YOUR ACCOUNT
Excessive punctuation!!!
ALL CAPS TEXT
Prize/Winner language
Pressure tactics

These patterns are used by phishing emails, advance-fee fraud (Nigerian prince scams), fake prize notifications, and credential harvesting attacks.

🛠️ How to fix this

If this obviously spammy email reached your inbox, your content filters may need adjustment:

  1. Review spam filter sensitivity Your spam filter may be set to a low sensitivity level. For Microsoft 365, check the spam filter threshold in Exchange admin center. For Google, review settings in Admin Console.
  2. For Microsoft 365 Go to Protection → Spam filter → Anti-spam inbound policy. Consider setting "Spam threshold" to "Standard" or "Aggressive" if it's currently on "Relaxed."
  3. For Google Workspace In Admin Console → Apps → Google Workspace → Gmail → Spam, Phishing and Malware, ensure spam filtering is enabled and consider enabling "Aggressive" filtering.
  4. Check for bypass rules Review your mail flow rules to ensure nothing is bypassing spam filtering. Sometimes well-intentioned rules (like "allow all email from external partners") can create gaps.
  5. Review third-party security tools If you use an email security gateway, review its content filtering settings. Many default configurations are too permissive.
  6. Report spam that gets through Most email systems learn from user feedback. When spam reaches your inbox, use the "Report spam" or "Junk" button to help train the filter.

📚 How Content Filtering Works

  1. Pattern matching Filters look for known spam phrases, excessive punctuation, ALL CAPS, and suspicious formatting patterns.
  2. Bayesian analysis Statistical analysis compares the email's word patterns against known spam and legitimate email databases.
  3. Machine learning Modern filters use AI to detect new spam patterns based on characteristics of previously identified spam.
  4. Reputation + content The best filters combine sender reputation (authentication) with content analysis. Our test passed authentication but should have failed content checks.
  5. User feedback loop When users mark email as spam or not-spam, the filter learns and improves. This is why reporting spam matters.