Skip to main content

How do suppression systems use bounce classifications?

Suppression systems act on bounce classifications:

Classification-to-action mapping:

Hard bounce (5.1.1, user unknown): Suppress immediately, no exceptions. Soft bounce (4.2.2, full): Increment counter, suppress after threshold. Block bounce (5.7.1, policy): May suppress or flag depending on cause. Technical bounce (DNS, TLS): Usually do not suppress address.

Threshold logic:

Track soft bounces per address. Count consecutive or total failures. Apply time window (failures in last 30 days). Trigger suppression when threshold met.

Configuration options:

Immediate vs delayed suppression. Threshold values by bounce type. Time windows for counting. Override rules for special cases.

Classification determines destiny. The system knows what each bounce type means and acts accordingly.