An increase in bot-like clicks from Outlook can stem from several sources. It's a common issue, possibly targeted by Microsoft towards specific ESPs. Root causes include security software, link expanders, firewalls, automated Outlook processes, link crawling by email providers, pre-fetching by clients, and link protection services rewriting URLs. Identification involves analyzing click metadata, IP addresses, user agent strings, and leveraging reverse DNS. Mitigation includes implementing honeypots, monitoring traffic patterns, using machine learning-based bot management, and understanding the limitations of the 'Do Not Track' header. Preventing bot interactions upfront is crucial.
6 marketer opinions
Several factors can cause a large uptick in Outlook clicks that appear to be bots. These include security software, link expanders, enterprise firewalls, and automated processes within Outlook's infrastructure that access URLs. Additionally, email providers and clients often crawl links for security, pre-fetch links to improve browsing speed, and use anti-virus software to scan for threats. Link protection services rewrite URLs, leading to skewed click metrics due to pre-scanning. Mitigation strategies include implementing honeypot systems, monitoring IP addresses for inconsistencies, segmenting audiences, and analyzing click patterns to identify unusual engagement.
Marketer view
Email marketer from Reddit explains that you can implement a honeypot system or look for patterns, for example, IPs clicking all the links within a short time frame. Also consider bot detection services.
2 Mar 2023 - Reddit
Marketer view
Email marketer from Email Vendor Selection states that some click bots are deployed by security services or email clients to pre-scan links for malware or phishing, which can inflate click rates. They recommend monitoring the IP addresses of the clickers for inconsistencies.
21 Jun 2024 - Email Vendor Selection
4 expert opinions
The uptick in bot-like clicks from Outlook is not an isolated incident, as similar issues have been reported recently. Experts recommend analyzing click metadata, such as IP addresses and user agent strings, to identify the source. Microsoft may be targeting specific Email Service Providers (ESPs) with this behavior. Reverse DNS lookups can help determine the origin of the clicks, and preventative measures should be prioritized.
Expert view
Expert from Word to the Wise explains that identifying bot clicks often requires analyzing click patterns, IP addresses, and user agent strings. She recommends using reverse DNS lookups to identify the origin of the clicks. Additionally, they suggest that the best way to handle bots is to prevent the interaction from happening in the first place
3 Nov 2023 - Word to the Wise
Expert view
Expert from Email Geeks suggests to check metadata about where the clicks come from, such as IP addresses, to investigate the source of the clicks.
28 Jan 2024 - Email Geeks
3 technical articles
The uptick in bot clicks on email links can be addressed using various methods. Cloudflare's bot management tools leverage machine learning to identify and mitigate bot traffic, including sophisticated bots designed to evade detection. Google Search Central recommends monitoring website traffic for unusual patterns and analyzing server logs to identify the source of these clicks. The IETF's 'Do Not Track' header provides a mechanism for users to signal their preference against tracking, although its effectiveness depends on the recipient's compliance.
Technical article
Documentation from IETF explains the HTTP 'Do Not Track' header that can be used to signal to websites and services that the user does not want to be tracked. However, this is only a signal and relies on the recipient honoring it.
3 Jun 2024 - IETF
Technical article
Documentation from Cloudflare explains that their bot management tools use machine learning to identify and mitigate bot traffic, including those that may be generating spurious clicks on email links. It also detects and mitigates sophisticated bots that try to evade detection.
17 Jul 2021 - Cloudflare
How can I detect and segment bot clicks in email campaigns?
How can I identify and handle bot clicks and opens, particularly from Microsoft/Outlook domains, in email marketing campaigns?
How can I identify and handle suspicious bot clicks in email marketing campaigns?
How can I identify and mitigate the impact of bot clicks on email marketing metrics?
How can I prevent bot clicks from hurting my email reputation?
How can you deduce inbox placement metrics using per-ISP open rates and manage bot opens?