· 3 min read

How to stop CampaignMonitor CM Commerce emails going to junk

Learn how to stop CampaignMonitor CM Commerce emails from going to spam or junk. Learn how to authenticate via SPF and DKIM and remove 'via campaignmonitor.com' and 'on behalf of campaignmonitor.com' from your marketing campaigns to enhance your deliverability, professionalism, and credibility.

Learn how to stop CampaignMonitor CM Commerce emails from going to spam or junk. Learn how to authenticate via SPF and DKIM and remove 'via campaignmonitor.com' and 'on behalf of campaignmonitor.com' from your marketing campaigns to enhance your deliverability, professionalism, and credibility.

Authenticating CampaignMonitor CM Commerce Emails with SPF and DKIM

Why are my CampaignMonitor CM Commerce emails going to Spam?

If you have a problem with CampaignMonitor CM Commerce emails going to spam, that is, going to the junk folder of your recipients, then it is very likely an issue with your email authentication. Emails failing authentication, be they failing SPF, failing DKIM, or failing DMARC is common, as SPF, DKIM, and DMARC are often not properly implemented by domain administrators. Often, the main cause of CampaignMonitor CM Commerce emails being blocked is due to the CampaignMonitor CM Commerce emails failing DMARC, which in the case of CampaignMonitor CM Commerce, is usually due to a misconfiguration of SPF and DKIM.

How to stop CampaignMonitor CM Commerce emails going to Junk.

The first step to preventing CampaignMonitor CM Commerce email going to spam is to retrieve a failed message and access its header information. This will allow you to quickly diagnose whether any authentication issues such as DKIM or DMARC are flagging your email as spam, instructing the recipient sender to move it to junk. Simply paste the email headers into our free Stellastra Deliverability Tool, which you can use freely with no log in required. Our deliverability tool should allow you to avoid CampaignMonitor CM Commerce emails from going to spam, or at least rule out authentication as the issue.

How to remove ‘via campaignmonitor.com’ or ‘on behalf of campaignmonitor.com’

Another example of where a CampaignMonitor CM Commerce DKIM misconfiguration is to blame, is if your recipients report seeing the message as ‘via campaignmonitor.com’ or ‘on behalf of campaignmonitor.com’ and that the emails typically end up in spam or junk. The Stellastra Email Deliverability tool above will confirm this prognosis, however, you may also wish to configure DKIM for CampaignMonitor CM Commerce by logging in to your CampaignMonitor CM Commerce account to check to see if you have followed the following article to configure your CampaignMonitor CM Commerce dkim setup to authenticate your domain.

How to stop CampaignMonitor CM Commerce Failing DMARC

To ensure that your CampaignMonitor CM Commerce campaigns pass DMARC and get delivered to your prospects, it is important to ensure that DKIM and SPF passes authentication for your domain. A common mistake is to sign an email with CampaignMonitor CM Commerce’s own DKIM keys. However, in order for CampaignMonitor CM Commerce’s email to pass authentication for your own domain, it is necessary to use your own DKIM keys as per CampaignMonitor CM Commerce’s own guide. If you wish to verify the above, paste the message headers for a failed CampaignMonitor CM Commerce message into our CampaignMonitor CM Commerce email testing tool. Furthermore, you should also follow the instructions on how to set up SPF authentication for CampaignMonitor CM Commerce.

How can I gain visibility over who is sending with my domain?

Stellastra’s email deliverability visibility tool takes reports from all modern inbox providers including Google (Gmail), Microsoft (Outlook), Mimecast, and Zoho to show who is sending email using your domain. This ensures that 1) you are monitoring your outbound emails to diagnose why emails are going to spam, and 2) that you take steps to lock down your domain, become secure, and comply with Google and Yahoo’s 2024 bulk email sending policies.

How can I ensure I am compliant with Yahoo and Google’s 2024 Email Sending DMARC Guidelines?

Our email deliverability visibility tool will indicate whether you are compliant with Google and Yahoo’s February 2024 email guidelines for bulk senders. Google sends us reports alongside all modern email inbox providers.

Stellastra was a massive help and took minutes fixing an email issue that we thought would be extremely time consuming. Stellastra was a hub of knowledge and we couldn't recommend them enough!

Brittani Guerra, Marketing Executive, UK Cyber Cluster Collaboration

Get Specialist Deliverability and DMARC Consulting for CampaignMonitor CM Commerce

Contact Us

Get Experienced Consulting Today

Our support team typically responds within 24 business hours.

    Share:
    Back to Blog

    Related Posts

    View All Posts »
    Anti Spam Laws Around the World

    Anti Spam Laws Around the World

    Spam, unsolicited electronic communication, has become a global issue that affects individuals, businesses, and governments alike. Various countries have developed anti-spam laws to protect consumers from unwanted emails, messages, and other forms of digital marketing. These laws vary by region, but they generally focus on requiring consent from recipients, providing clear opt-out mechanisms, and penalizing violators with hefty fines. Below is an overview of key anti-spam regulations from the United States, Canada, New Zealand, Australia, Ireland, and the United Kingdom.

    What is Risk Reduction in Cyber Security - 50 Ways to Reduce Risk

    What is Risk Reduction in Cyber Security - 50 Ways to Reduce Risk

    Explore the essentials of risk reduction in cyber security and learn how to proactively protect your organization. Uncover strategies for minimizing vulnerabilities, strengthening defenses, and implementing best practices to lower potential cyber threats and ensure robust digital security.

    What is Risk Transfer in Cyber Security - 40 Ways to Transfer Risk

    What is Risk Transfer in Cyber Security - 40 Ways to Transfer Risk

    Discover how risk transfer in cyber security can safeguard your organization. Learn about strategies to mitigate potential cyber threats by shifting liability, utilizing insurance, and partnering with third-party experts. Explore effective ways to protect your digital assets.