Email analytics often rely on JavaScript to accurately track user engagement, including clicks. However, various automated systems, particularly link security checkers and anti-phishing bots, interact with email links without executing JavaScript. This can lead to a discrepancy in analytics, where legitimate security scans are registered as clicks from users without JavaScript enabled, skewing engagement data.
Key findings
Bot interaction: Security checkers and email scanners often click links to pre-scan them for malicious content, and these automated processes may not execute JavaScript.
Immediate clicks: A high volume of immediate clicks, especially from unusual IP addresses or user agents, can indicate automated security scanning rather than human interaction.
No-JS reports: These automated clicks are frequently reported by analytics as originating from environments where JavaScript is disabled, leading to false 'no-JS' reports.
Impact on metrics: Such false positives can inflate click rates and distort understanding of actual user engagement with email campaigns. Learn how to identify artificial email opens and clicks.
Key considerations
Data accuracy: It is crucial to differentiate between bot clicks and genuine user engagement to ensure accurate analytics and campaign optimization. Some bots are designed to click links to identify malware.
Security protocols: Email security software often involves clicking hyperlinks as part of its scanning process. For more information, read do email security solutions click hyperlinks?
Filtering strategies: Marketers may need to implement strategies to filter out these bot clicks from their reported analytics to get a clearer picture of human behavior.
Behavior analysis: Analyzing user behavior patterns beyond initial clicks, such as subsequent page views or conversions, can help distinguish genuine engagement from bot activity.
What email marketers say
Email marketers frequently encounter challenges in distinguishing genuine user engagement from automated clicks generated by security systems. Many report seeing a significant number of immediate clicks, often attributed to 'no-JS' environments, which they suspect are from email security checkers rather than human subscribers. This phenomenon affects the accuracy of their email campaign analytics and can lead to misinterpretations of subscriber behavior and campaign performance.
Key opinions
Confirmation of issue: Marketers confirm that link security checkers can indeed register as clicks from browsers not supporting JavaScript.
High immediate clicks: There's a common observation of a high volume of immediate clicks, many of which report as 'no-JS' users.
Hidden link strategy: Some marketers suggest using hidden links in the email footer/header to identify and filter out bot clicks. This relates to HTTP tracking links.
Untracked clickers: Marketers also observe 'untracked clickers' or clicks with zero pageviews, often originating from schools and businesses, indicating automated scanning. Marketers can identify and report bot clicks.
Key considerations
Automated engagement: The prevalence of security clickers necessitates adjusting expectations for email click-through rates, as not all clicks represent human engagement.
Analytics interpretation: It's important to refine analytics methods to filter or account for these bot interactions to gain accurate insights into campaign performance.
Platform behavior: Some email platforms may inadvertently create hidden links, leading to accidental bot tracking, as noted by some marketers.
Email marketer from Email Geeks indicates that link security checkers can indeed register as a browser not supporting JavaScript, which directly answers the initial query. This confirms the suspected source of 'no-JS' reports.
13 Jan 2023 - Email Geeks
Marketer view
Marketer from Email Geeks confirms a significant number of immediate clicks, expressing concern that many are reporting back as users without JavaScript, reinforcing the need to distinguish these from genuine engagement.
13 Jan 2023 - Email Geeks
What the experts say
Email deliverability experts highlight that while security scanners clicking links is a known phenomenon, the use of invisible or hidden links to detect these automated interactions carries potential risks. Microsoft has, in private discussions, advised against such practices, signaling potential deliverability or compliance concerns despite some senders reporting no immediate issues. This indicates a nuanced understanding is required regarding security practices and their indirect impact on email program performance and reputation.
Key opinions
Microsoft's stance: A key opinion from experts is that Microsoft has warned against using invisible links in emails, a technique sometimes employed to identify security scanner clicks.
Lack of public information: The warning about invisible links appears to stem from private discussions, meaning there's no widely available public documentation on this specific policy, making it harder to track. This impacts how experts approach email deliverability issues.
Observed behavior: Despite warnings, some organizations using invisible links have not reported issues, even on large volumes of emails, suggesting the impact might not be universal or immediately apparent.
Ongoing vigilance: Experts emphasize the need for continued monitoring and awareness of how such tactics could impact deliverability and sender reputation. This is vital to improve domain reputation.
Key considerations
Hidden link risks: While invisible links can help identify bot clicks, the potential for negative impact on deliverability or being flagged as suspicious content remains a concern for experts.
Vendor communication: The lack of public advisories from major ESPs regarding hidden links makes it difficult for senders to confirm compliance or understand best practices.
Evolving policies: Email service providers and security companies continuously update their filtering mechanisms, meaning strategies that work today may not be effective or safe tomorrow.
Impact on blocklists: Misleading analytics or flagged practices could potentially lead to IP or domain blocklisting, impacting overall email program health. Understanding real-time blocklists is important.
Expert view
Expert from Email Geeks confirms that Microsoft explicitly warned against using invisible links in emails, indicating a potential risk associated with this practice despite its use for filtering bot clicks.
13 Jan 2023 - Email Geeks
Expert view
Expert from Email Geeks notes that the warning from Microsoft about invisible links came from a private discussion in early 2020. This indicates a lack of public guidance on the matter.
13 Jan 2023 - Email Geeks
What the documentation says
Official documentation and security research often detail how link security checkers operate. These systems are designed to mimic user behavior to identify phishing, malware, and other threats within emails. While their primary goal is protection, their operational methods, such as pre-fetching links or following redirects without full JavaScript execution, can inadvertently generate false 'no-JS' clicks in email analytics. Understanding these technical nuances is crucial for email senders to interpret their engagement data accurately and maintain good sending practices.
Key findings
Phishing detection: Phishing analysis guides demonstrate that security systems automatically inspect email headers and links to detect malicious content, which involves clicking. Find out more about inspecting email headers.
Automated analysis: Tools and AI models are utilized to analyze phishing emails, including detecting malicious links. This automated process can trigger analytic tracking.
Behavioral simulation: Security checkers often simulate a user's click without fully rendering the page, which explains why JavaScript-dependent analytics might not register correctly.
Link security: The importance of secure (HTTPS) links for sender reputation is highlighted, indicating that security systems prioritize safe navigation, regardless of JavaScript execution. Learn more about SSL for tracked links.
Key considerations
Protocol adherence: While security checkers might not execute JavaScript, they typically follow standard web protocols. Ensuring your links are secure (HTTPS) is critical. For instance, does using HTTP links affect deliverability?
Security implications: Phishing prevention is a primary concern for security systems, so their automated clicks are a necessary evil for inbox protection. Cisco outlines what phishing is.
Advanced detection: The sophistication of phishing attacks means security checkers must be aggressive in their link analysis, contributing to the volume of 'no-JS' clicks.
Impact on deliverability: While not directly impacting deliverability through blacklisting for the 'no-JS' itself, the underlying practices (like using hidden links) could be scrutinized.
Technical article
Documentation from Keepnet Labs explains how to perform step-by-step phishing email analysis. This process often involves automated link scanning, which can result in clicks that do not execute JavaScript.
10 Apr 2024 - Keepnet Labs
Technical article
Intezer documentation details techniques threat actors use to make phishing emails look legitimate. Security systems must analyze these for malware delivery, contributing to automated link interactions.