Suped

Understanding X-Microsoft-Antispam-Mailbox-Delivery Header Values

Matthew Whittaker profile picture
Matthew Whittaker
Co-founder & CTO, Suped
Published 20 Jul 2025
Updated 19 Aug 2025
8 min read
Email headers are like the postal stamps and labels on a physical letter, providing a detailed audit trail of an email's journey from sender to recipient. For email deliverability professionals, dissecting these headers is crucial for diagnosing issues and ensuring messages land in the inbox.
Among the many headers present in emails processed by microsoft.com logoMicrosoft systems (like Outlook.com and Exchange Online Protection), the X-Microsoft-Antispam-Mailbox-Delivery header offers specific insights into how an email was finally delivered to a user's mailbox. This header is particularly useful because it reflects the outcome of Microsoft's internal filtering decisions, going beyond the general spam confidence levels.
Unlike some other anti-spam headers that provide scores or reasons for initial filtering, the X-Microsoft-Antispam-Mailbox-Delivery header is added only after the message reaches the mailbox. This means it provides the ultimate verdict on where the email landed. Understanding its various parameters can help unravel why an email might end up in the junk folder despite seemingly good reputation metrics like SCL and BCL values.

Decoding primary values

The X-Microsoft-Antispam-Mailbox-Delivery header contains several key-value pairs, each shedding light on a different aspect of the delivery decision. The dest parameter is often the most direct indicator of where the email landed. For example, if you see dest:J, it means the email was delivered to the junk folder. This is a critical piece of information for troubleshooting, as it confirms the message was indeed classified as junk by learn.microsoft.com logoMicrosoft's filters at the point of mailbox delivery, rather than being moved manually by the user or by a client-side rule. According to Oxford IT, this indicates the final delivery decision.
The auth parameter, typically displaying auth:1 for authenticated emails, shows whether email authentication (like SPF, DKIM, and DMARC) passed. While a passing auth value is a good sign, it doesn't guarantee inbox placement, as other factors can still lead to junk folder delivery. The jmr (junk mail rule) and ucf (user configured filter) parameters reveal if delivery was influenced by any user-defined rules. A 1 for jmr or ucf indicates such a rule was triggered.
Here's a breakdown of some common parameters in the X-Microsoft-Antispam-Mailbox-Delivery header:

Parameter

Description

Common values

dest
Indicates the final delivery location within the mailbox.
I (Inbox), J (Junk Email folder), D (Dropped).
auth
Shows if email authentication passed.
1 (Passed), 0 (Failed).
jmr
Indicates if a Junk Mail Rule was applied by Exchange.
1 (Rule applied), 0 (No rule).
ucf
Indicates if a user-configured filter affected delivery.
1 (Filter applied), 0 (No filter).
Understanding these core parameters is your first step in diagnosing why your emails might be landing in undesirable folders within Microsoft mailboxes. They provide direct clues about the final classification decision.

Understanding whitelist and blocklist indicators

The X-Microsoft-Antispam-Mailbox-Delivery header also contains parameters that indicate whether the sender or recipient is on a whitelist (or safelist) or a blacklist (or blocklist). These include values like wl (whitelisted), pcwl (policy control whitelist), and rwl (recipient whitelist). According to Perception Point, a wl:1 suggests the sender is whitelisted and considered safe. Conversely, kl (kill list or blocklist) indicates a sender might be explicitly blocked.
A value of 0 for these parameters means the corresponding whitelist or blacklist (blocklist) rule was not triggered. For instance, wl:0 implies the sender isn't on the standard whitelist. Other related values include abwl (auto-block whitelist), iwl (IP whitelist), dwl (domain whitelist), and dkl (domain kill list). Understanding these flags helps pinpoint whether specific sender or recipient settings contributed to the delivery outcome, especially when considering the impact of email blacklists.

Best practices for list management

  1. Maintain clean lists: Regularly remove inactive or unengaged subscribers to reduce spam complaints and improve engagement metrics.
  2. Encourage whitelisting: Instruct recipients to add your email address to their safe sender lists.
  3. Monitor blocklists: Regularly check if your IP or domain is listed on any public blacklists (or blocklists) that might affect deliverability.

Important note on private blocklists

It's important to remember that many blocklists, especially those used by major providers like Microsoft, are private. These internal blacklists (or blocklists) are not publicly accessible, meaning you cannot directly check them. The X-Microsoft-Antispam-Mailbox-Delivery header provides one of the few glimpses into how these internal systems might be impacting your mail flow.

Advanced parameters and their significance

Beyond the explicit delivery and list indicators, the X-Microsoft-Antispam-Mailbox-Delivery header often includes parameters like OFR (Other Filtering Reason), ENG (Engine), and RF (Reason Flag). These typically contain codes and values that are primarily for Microsoft's internal diagnostic purposes. While they might seem cryptic, they signify that certain anti-spam engines or rules contributed to the final delivery decision. For example, OFR:SpamFilterAuthJ suggests that the spam filter determined the authentication caused the junking, or was involved in it.
These advanced parameters, particularly the ENG values, often correspond to specific filtering engines or rule sets within Exchange Online Protection. While the exact meaning of each numerical code is proprietary, their presence indicates that a message underwent thorough analysis. If your emails consistently land in junk, even with good SCL and BCL scores (Spam Confidence Level and Bulk Confidence Level), these parameters can sometimes offer subtle clues, suggesting that an underlying rule or engine is consistently flagging your content or sending patterns.

Typical sender issues

  1. Poor sender reputation: High complaint rates or spam trap hits.
  2. Missing authentication: Lack of SPF, DKIM, or DMARC records.
  3. Spammy content: Excessive links, poor formatting, or suspicious keywords.
  4. Engagement decline: Low open or click rates, high unsubscribe rates.

Insights from X-Microsoft-Antispam-Mailbox-Delivery

  1. Direct delivery status: dest:J indicates confirmed junk delivery by Microsoft.
  2. Authentication impact: auth:0 points to authentication failure as a factor.
  3. Recipient/Policy override: jmr:1 or ucf:1 suggests recipient-side rules are in play.
  4. Internal engine flags: ENG values indicate deeper filtering reasons, even if general scores look good.
While the X-Microsoft-Antispam-Mailbox-Delivery header provides granular detail on the final delivery outcome, these deeper OFR, ENG, and RF parameters are generally more valuable to Microsoft support engineers or those with deeper access to Microsoft's internal documentation. For most senders, focusing on the dest and authentication indicators (auth) provides the most actionable insights for improving deliverability.

Leveraging the header for deliverability insights

To effectively use the X-Microsoft-Antispam-Mailbox-Delivery header, you first need to locate it within the full email header. Most email clients allow you to view the raw message source, which includes all headers. Once you have the raw header, you can parse it manually or use an online header analyzer to make it more readable. Look for the line starting with X-Microsoft-Antispam-Mailbox-Delivery and identify the various key-value pairs separated by semicolons.
When troubleshooting deliverability, this header is often analyzed in conjunction with other Microsoft-specific headers, such as X-Forefront-Antispam-Report. For instance, if X-Forefront-Antispam-Report shows a high SCL (Spam Confidence Level) and X-Microsoft-Antispam-Mailbox-Delivery shows dest:J, it confirms that Microsoft's filters actively routed the message to junk. On the other hand, if dest:I appears, but the user reports the email in junk, it might indicate a user-configured rule (ucf:1) or a post-delivery action.
This header is a critical tool for diagnosing Microsoft deliverability issues. By combining its insights with information from other anti-spam message headers and your own sending practices, you can form a comprehensive picture of why your emails are or are not reaching the inbox. This forensic approach helps you refine your email strategies and ensure optimal inbox placement.

Views from the trenches

Best practices
Always include proper email authentication (SPF, DKIM, DMARC) for your sending domains.
Regularly monitor your email engagement metrics to identify potential issues early.
Segment your audience and tailor content to increase relevance and avoid spam triggers.
Keep your email lists clean by removing unengaged subscribers and bounced addresses.
Provide clear unsubscribe options in all your marketing emails to reduce complaints.
Common pitfalls
Ignoring the 'dest:J' indicator and assuming other headers are sufficient for troubleshooting.
Sending to outdated or unverified email lists, leading to high bounce and complaint rates.
Failing to set up DMARC, or setting it to a policy too strict too early.
Not analyzing the full email header, missing crucial diagnostic details.
Overlooking recipient-specific junk mail rules or filters that may override global settings.
Expert tips
Focus on maintaining a strong sender reputation across all mailbox providers.
Use tools that can parse complex headers for easier analysis and diagnosis.
Understand that even with good SCL/BCL scores, specific internal rules can still route to junk.
Test your emails with various Microsoft accounts to observe actual delivery outcomes.
Collaborate with your IT department to review any custom Exchange Online Protection rules.
Marketer view
Marketer from Email Geeks says they often see
2020-03-10 - Email Geeks
Expert view
Expert from Email Geeks says that many parameters within this header are primarily for
2021-07-25 - Email Geeks

Final thoughts on header analysis

The X-Microsoft-Antispam-Mailbox-Delivery header is an invaluable diagnostic tool for anyone sending emails through Microsoft's ecosystem. It provides direct, post-filtering insights into why an email ended up in a specific mailbox folder, be it the inbox or the junk folder. By understanding the meanings of its various parameters, particularly dest, auth, and jmr, you can gain clarity on delivery outcomes that might otherwise remain a mystery.
Always combine the analysis of this header with other factors affecting email deliverability, such as sender reputation, content quality, and recipient engagement. By diligently interpreting these signals, you can fine-tune your sending strategies, proactively address potential issues, and significantly improve your inbox placement rates in Microsoft environments.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing