EveryCloud Technologies    

Essential Set Up documentation

Inbound Email Requirements

Firewall / Receive connector configuration

To prevent the direct delivery of emails to your mail server, we strongly recommend that you configure your Firewall or mail server receive connector to accept SMTP connections on port 25 from only EveryCloud Technologies IP ranges, as listed below.

All Clients (except Australia / New Zealand)

Australasian Clients Only

Once your firewall/receive connector is locked down to the above IP ranges, use our firewall tester here to ensure your infrastructure accepts connections from our IP ranges.

MX Record Syntax

Once you have ensured that you're mail infrastructure is able to accept connections from all of our IP ranges and you have allowed at least  90 minutes for your new account to propagate through our global infrastructure, you will then need to change the DNS MX records for the domain now present on our system

Your new MX record syntax for European / African / Asian customers

Priority 10: mx101.everycloudtech.com

Priority 20: mx102.everycloudtech.com

Priority 30: mx103.everycloudtech.com

Priority 40: mx104.everycloudtech.com

Your new MX record syntax for North American customers

Priority 10: mx101.us.everycloudtech.com

Priority 20: mx102.us.everycloudtech.com

Priority 30: mx103.us.everycloudtech.com

Priority 40: mx104.us.everycloudtech.com

Your new MX record syntax for Australasian customers

Priority 10: mx301.au.everycloudtech.com

Priority 20: mx302.au.everycloudtech.com

Priority 30: mx303.au.everycloudtech.com

Priority 40: mx304.au.everycloudtech.com

Outbound Email Requirements

Send connector configuration

EveryCloud's European / African / Asian customers

Please configure your send connector to send outbound through our dedicated Smart-host: outbound.everycloudtech.com

EveryCloud's North American customers

Please configure your send connector to send outbound through our dedicated Smart-host: outbound.us.everycloudtech.com

EveryCloud's Australasian customers

Please configure your send connector to send outbound through our dedicated Smart-host: outbound.au.everycloudtech.com

* European & Australasian customers should connect to our Smart host on port 25, North American customers may connect on port   25 or 587

Please ensure that you have inserted the correct public facing, sending/relaying IP address in your control panel account and allow at least 90 minutes for the IP address to globally deploy before directing outbound traffic through our smart-host. By inserting your public facing sending IP address into the relays section, ensures outbound traffic connecting to our Smart-host is authenticated. If your sending/relaying IP address is not contained/inserted within your control panel account, our system will not allow you send outbound through our smart-host. 

Important: Service Requirements

In order to protect the reputation of our relays and the continuity of service for all our customers, the below actions are defined as a 'service requirement' when sending outbound email through EveryCloud's infrastructure.

Regrettably, failure to comply with the below service requirements may lead to severe IP reputation damage and as such, EveryCloud reserves the right, without notice, to restrict a customers outbound mail flow through our relays, if it becomes clear, that IP reputation damage has been caused as a direct result of non-compliance with our service requirements.

Service requirement 1.

Sending domain SPF/TXT record

If you intend to send outbound through our service by connecting to our smart-host, you must construct an SPF/TXT record, which authorises our sending servers to send on behalf of you domain. If you do not authorise our sending relays to send on behalf of your domain, recipients systems may consider that email transitioning outbound through our relays is unsolicited.

SPF/TXT record format

If you currently have a TXT record in place, you should alter it, by adding an additional statement is:  'include:' statement. EveryClouds include  'include:spf.everycloudtech.com'  

If you do not currently have a TXT record in place, please construct one within your DNS admin console.

Example TXT record

"v=spf1 include:spf.everycloudtech.com -all"    

As default, SPF checking on inbound email is not performed by EveryCloud. However, it can be enabled by our support team - we offer 2 levels of SPF checking. Please read this guide for more details - http://support.everycloudtech.com/support/solutions/articles/4000053373-spoofed-email-response-spf-checking.

The next step is to contact the EveryCloud support team and to request SPF checking of inbound email to be enabled. In your support request you need to detail;
  • Primary domain to enable SPF checking
  • Any alias domains to enable SPF checking
  • What type of SPF checking is required

Service requirement 2.

Bulk email / Mail shots / Newsletters

If a customer intends sending bulk emails/mail shots outbound through our relays, it is a stringent service requirement, that email recipients are provided with a clear un-subscribe link/option contained within the body of the email and that the intended recipients have personally subscribed to the mail shot in advance. 

Once an email recipient unsubscribes to the mailshot/bulk email, the recipient must be removed from all further mailshot / bulk email correspondence within 24 hours. If your organisation fails to comply with these sending requirements, EveryCloud will impose permanent sending restrictions on your ability to send mail outbound through our platform infrastructure.

In addition, Inbound emails that are sent inbound from clear mass mailing environments which also do not contain a clear unsubscribe link will be treated as info-mail. 

Service requirement 3.

Sending spam, viruses or malware outbound. (Important)

Please be aware of this service requirement, as it is important and relevant to any customer sending outbound through our service relays.

If your mail server security has been compromised due to your mail servers security being inadequate (definitions below *) and your compromised mail server sends mass outbound spam , viruses or malware outbound thorough our relays and as a consequence EveryCloud relay servers are as a result blacklisted. You, the customer, the partner will be responsible for any costs attributed to de-listing. This means you will need to perform the de-listing yourself with the relevant blacklist.

Definitions of mail server inadequate security, but by no means exhaustive.

  • an unknown or known third party is/was able to connect into your mail server directly and relay spam, viruses or malware outbound through our infrastructure
  • an unknown or known third party is/was able to authenticate with your mail server by any means and was able to send spam, viruses or malware outbound through our infrastructure
  • an unknown or known third party is/was able to guess an end users mailbox password due to the mailbox password being non-complex and was able to relay spam, viruses or malware outbound through our infrastructure

Password Security Policy  We strongly advise that a password security policy is implemented. This is to ensure that access to the EveryCloud control panel and associated end user services such as continuity and archiving are kept secure. Password restrictions are enabled at a customer level at Management > Settings > Restrictions. We recommend that a strong password policy is implemented that ensures:- Minimum of 8 characters- Upper case letter in password- Lower case letters in password- Number in passwordAdditionally, special characters can also be used and access restricted to specific IP address / ranges;