Part One — Internal briefing · Staff newsletter · Email deliverability

The staff newsletter in Braze: what's happening, and the fix.

Staff have reported that the newsletter's performance dropped after the move to Braze, that resubscribed colleagues still aren't receiving it, and that replies are disappearing. Those reports are taken seriously and are addressed directly below. This briefing separates what the data actually shows from what the headline numbers appear to show — and lays out a concrete plan to resolve the genuine issues.

Scope
Bi-weekly staff newsletter only
Platforms compared
Mailchimp (through March) → Braze (April onward)
Status
Fixes scoped · rollout in progress
Audience
Marketing / MarTech · IT · HR leadership
01 — What's being reported

The concerns, as raised

Three distinct concerns have been raised about the staff newsletter since it moved to Braze. They are stated here in plain terms because each one is legitimate and deserves a direct answer — not because any of them is being dismissed.

Reported · performance
"Open rates dropped from around 40% to the 20s when we migrated to Braze."
The newsletter's reported open rate appears to have fallen sharply, and rebuilding it has been an ongoing effort over several months.
Reported · delivery
"Staff have resubscribed and confirmed they're on the list, but still don't receive the newsletter — and it isn't in their junk folder."
Multiple colleagues, confirmed back on the list, still are not receiving the email anywhere they can find.
Reported · replies
"Replies to the newsletter don't reach the sender — including one about a safety issue that was missed."
Staff reply to the address the newsletter appears to come from, and those messages don't arrive. A missed safety email makes this urgent.
Reported · sender warning
"Outlook shows a 'You don't often get email from…' warning at the top of the newsletter."
The warning names a c.outwardbound.org address — an address staff don't recognize as a real internal sender.
The bottom line

Braze is working, and it will work well for the staff newsletter. The open-rate drop is largely a measurement difference between two platforms that count opens differently — on the metric that is comparable, the change is modest and already recovering. The delivery and reply problems, however, are real — and they all trace to a single fixable cause: the newsletter currently shows c.outwardbound.org as its visible sender address. The plan in §4 resolves that cause directly.

02 — What's actually happening

The open-rate drop is mostly two rulers, not one decline

The "40% to the 20s" comparison sets a Mailchimp number next to a Braze number — but the two platforms do not measure opens the same way. Comparing them directly is like comparing a temperature in Fahrenheit to one in Celsius and concluding it got colder.

A

Two different "open rate" numbers

Measurement difference

Mailchimp's ~40–48% was a unique, human open rate — it counts each person once and strips out Apple Mail's automated opens.

Braze publishes two open-rate columns. The "Total Open Rate" column counts every open event — the same person opening twice counts twice, and machine opens are included. That is the column that shows values like 70%, 99%, even 106%. A figure above 100% is the clearest possible signal that this column is not measuring "what share of people opened." The comparable Braze figure is "Unique Open Rate," which is running around 30%.

So the honest comparison is not 40% vs. 20%. It is Mailchimp's unique opens (~46.7% weighted) vs. Braze's unique opens (~30.5% weighted) — and even that gap is partly methodology, because the two platforms still differ in how they treat machine opens.

B

Click rate is the metric that is comparable — and it tells a calmer story

Real but modest

Click rate is measured the same way on both platforms, which makes it the trustworthy spine of any comparison. On click rate, the staff newsletter went from a ~9.3% weighted average in Mailchimp to ~7.5% in Braze — a real but modest dip, not a halving.

Two things matter underneath that. First, the click rate was already declining inside Mailchimp before the migration — 14.9% in early January down to 5.7% by early March. That points to a newsletter content and call-to-action question, separate from the platform. Second, the Braze trajectory is climbing back: the first Braze send was the weakest, and the send two weeks later actually beat the Mailchimp click average.

Staff newsletter — click rate by send, Mailchimp through Braze

The solid metric is click rate, the one measure that is comparable across both platforms. Open rate is shown only as faint context — it is not comparable across the platform boundary.

Click rate — Mailchimp
Click rate — Braze
Open rate (context only — not comparable)
Staff newsletter click rate: Mailchimp Jan 9 14.9%, Jan 23 8.5%, Feb 6 9.6%, Feb 20 8.2%, Mar 6 5.7%; Braze Apr 3 3.9%, Apr 17 11.0%, May 1 6.5%, May 15 8.4%.
Source & method. Mailchimp values (Jan 9 – Mar 6, 2026) are from the Mailchimp staff newsletter analytics export; open rates are MPP-excluded human metrics. Braze values (Apr 3 – May 15, 2026) are from the Braze campaign comparison report; main sends only (Gmail-isolated split rows excluded), using Unique Click Rate and Unique Open Rate. Click rate is measured comparably on both platforms; open rate is not — Mailchimp reports MPP-excluded unique opens while Braze unique opens include machine opens, so open-rate bars are shown for context only. The April 3 Braze send was the first send on the new sending domain (cold-start). There is no same-week cross-platform overlap — staff newsletter sends in Mailchimp began only in late 2025 — so this chart shows the trend within each platform, not a head-to-head.
Open rate — comparable basis
~47% ~30%
Mailchimp unique vs. Braze unique. Part of this gap is still methodology, not lost readers.
Click rate — fully comparable
9.3% 7.5%
A modest, real dip — and the Braze figure is trending back up send over send.
Braze click trajectory
3.9 → 11 → 8.4%
First send weakest (cold-start); recovery is already visible across the next three.
03 — The genuine problems

Replies and delivery: real issues, one root cause

The disappearing replies, the missed safety email, the resubscribed staff who still don't receive the newsletter, and the Outlook warning are not measurement artifacts. They are real — and they all trace to a single configuration issue: the newsletter currently sends with c.outwardbound.org as its visible "from" address.

C

Why replies vanish — and why the emoji reaction still works

Genuine issue

c.outwardbound.org is a send-only subdomain. It is built to send marketing email and to keep that sending reputation separate from corporate mail — but it has no inbox behind it. When a staff member replies to a newsletter, their reply is addressed to c.outwardbound.org, and there is nowhere for that message to land. It does not reach the sender.

The diagram below also explains an oddity staff have noticed: a thumbs-up reaction on the newsletter does get through, while a typed reply does not. That is because a reaction is not a normal email — within Microsoft's ecosystem it travels as a lightweight notification routed differently from a standard reply. The fact that the reaction arrives but the reply doesn't is not a glitch; it actually confirms the diagnosis — the problem is the reply address, not the newsletter itself.

STAFF MEMBER Gets the newsletter Appears from: …@c.outwardbound.org TYPED REPLY Sent as normal email Addressed to the visible "from": c.outwardbound.org DOES NOT ARRIVE No inbox at subdomain Send-only subdomain — the reply has nowhere to land. EMOJI REACTION Not a normal email Travels as a Microsoft notification, routed apart. REACHES SENDER Arrives in the inbox Confirms the issue is the reply address, not content.
D

Why resubscribed staff still don't receive it

Genuine issue

This is the most counter-intuitive symptom, so it is worth being precise. Resubscribing a colleague in Braze controls one thing only: whether Braze sends them the email. It has no control over whether the recipient's mail system accepts and inboxes it.

If Outlook / Exchange has learned to distrust mail from c.outwardbound.org — because the address is unfamiliar, or because the newsletter was previously marked as spam by some recipients — Exchange can filter or quarantine the message before it ever reaches a Junk folder. That is why "I checked my junk and it isn't there" does not mean the email was delivered. It can be held in an administrative quarantine, routed away, or dropped entirely — all invisible to the recipient.

STEP 1

Braze sends

The newsletter is sent to the resubscribed staff member. Braze reports it as "sent."

STEP 2

Exchange receives

The message reaches the recipient's Microsoft 365 mail system for evaluation.

STEP 3

Filtered or quarantined

Distrust of the unfamiliar c. sender diverts it — to quarantine, a rule, or nowhere.

STEP 4

Never seen

It never reaches the inbox or the Junk folder. The recipient simply never sees it.

This is why confirming someone is "back on the list" in Braze is necessary but not sufficient — the block is happening on the receiving side, and it has to be diagnosed and cleared there.

One cause, four symptoms. The reply failure, the missed safety email, the silently filtered newsletter, and the Outlook "you don't often get email from…" warning are not four separate problems. They are one configuration issue — c.outwardbound.org in the visible sender field — surfacing four different ways. That is good news: one corrected setup resolves all of them.
04 — The plan

What we are doing to fix it

Three coordinated workstreams, owned across Marketing/MarTech and IT. The first is the permanent fix; the second is an immediate bridge so staff stop losing newsletter mail today; the third hardens delivery so the fix holds as volume grows.

1

Correct the "from" address in Braze

Owner — Marketing / MarTech
Permanent fix

The root cause. The newsletter's visible "from" address moves off the sending subdomain and onto a real, recognizable outwardbound.org address, with replies routed to a genuine, monitored inbox. The technical sending subdomain stays where it is — it is supposed to be there — it simply stops being the address staff see and reply to.

a
Change the visible "from" to an outwardbound.org address at both the Braze workspace-default level and the individual newsletter campaign level, so the setting can't silently revert.
b
Set the reply path so staff replies — including time-sensitive ones like safety reports — land in a real, monitored inbox.
c
Run a seed test to Outlook and Gmail test accounts before the next live send; confirm the sender displays correctly, replies route correctly, and the Outlook first-contact warning is resolved.
d
Pull per-recipient delivery detail from Braze for the staff who report not receiving it, so each case can be matched against IT's findings.
2

Quarantine check & internal whitelisting

Owner — IT
Immediate bridge

The "from" change is the permanent fix, but it does not retroactively release mail already filtered, and it cannot instantly rebuild sender trust inside Exchange. This workstream stops internal staff from losing the newsletter today while the permanent fix takes hold.

a
Run an Exchange Online message trace for the named staff who aren't receiving the newsletter — to pinpoint exactly where each message is being stopped: quarantine, a transport rule, junk, or never delivered.
b
Check quarantine and tenant/mailbox block rules for anything matching c.outwardbound.org, and release any newsletter mail being held.
c
Add a safe-sender / mail-flow allow rule so internal staff reliably receive the newsletter while the "from" change rolls out across all sends.
d
Cross-match IT's message-trace results against Braze's per-recipient delivery data, so every stuck staff member gets a definitive resolution, not a guess.
3

Restructured IP warming & sender reputation

Owner — Marketing / MarTech
Hardening

A brand-new sending domain begins life with no reputation, and mail systems treat unproven senders cautiously. The weak first Braze send and the early delivery friction are textbook signs of a domain still warming up. This workstream makes sure the corrected setup is also a well-warmed one.

a
Review and restructure the IP / domain warm-up schedule so sending volume ramps at a pace mail providers reward, rather than triggering caution.
b
Maintain Braze's inbox-provider segmentation (separating Outlook, Gmail, and other recipient domains) so reputation builds steadily with each provider and weak spots are visible early.
c
Standardize newsletter reporting on consistent, comparable metrics — unique open rate, click-to-open rate, and click rate — so performance is never again read off two different rulers.
d
Review recent newsletter content and calls-to-action, since click rate was already softening before the migration — the strongest past edition is the model to study.
Immediately

Stop the bleeding

IT message trace, quarantine release, and a safe-sender rule so internal staff receive the newsletter right away.

Before next send

Apply the real fix

The "from" address change in Braze, verified by a seed test to Outlook and Gmail before any live send.

Ongoing

Harden & verify

Warm-up restructured, every stuck case resolved against trace data, consistent metrics going forward.

05 — In summary

Braze is working — and the gaps have a clear fix

The concerns raised about the staff newsletter are taken seriously and have been investigated directly against the data. Here is where things actually stand.

On the open-rate drop
Largely a measurement difference between two platforms. On the comparable metric — click rate — the change is modest (~9.3% to ~7.5%) and already recovering. Reporting will be standardized so this confusion does not recur.
On replies & delivery
Genuine issues — and correctly identified. All trace to one cause: c.outwardbound.org in the visible "from" field. One corrected setup resolves the vanishing replies, the filtered newsletter, and the Outlook warning together.
On the safety-email miss
Treated as urgent. Once the reply path points to a real monitored inbox, time-sensitive replies — including safety reports — reach a person. The bridge fix shortens the window before that is fully in place.
On confidence in Braze
Warranted. The newsletter's underlying engagement is healthy, the Braze trend is moving the right way, and the delivery problems are specific, understood, and already being fixed — not signs of a platform that doesn't work.
The same pattern, confirmed elsewhere. The Development email program shows the identical measurement effect — the same campaign sent through both platforms reports very different open rates purely because the platforms count differently — and the same early warm-up friction. That cross-check is covered in the separate Development performance report. It confirms this is a known, well-understood migration effect with a known fix, not a defect specific to the staff newsletter.
Part Two — Technical reference

How Braze sends email, in technical detail

Part One explains the perception, the data, and the plan. Part Two is the underlying technical reference — how Braze composes, signs, routes, and delivers email through the c.outwardbound.org sending subdomain, and why the fix in Part One §04 carries no deliverability risk. It is written for IT and MarTech readers who need the mechanism, not just the summary.

00 — Confirmed config & illustrative values

What's verified vs. what's pattern-only

The sub-processor identity in this document is confirmed against our actual Braze configuration. Specific DNS record values shown later (record content, DKIM selectors, SPF includes) are illustrative patterns drawn from standard SparkPost setups — they communicate the structure correctly but should be replaced with verified values from our live DNS zone before this is treated as a definitive record of our published configuration.

Confirmed · sub-processor identity

SparkPost is the email sub-processor configured against our Braze workspace, confirmed via the Braze dashboard. This is what handles DKIM signing, IP selection, SMTP delivery, and bounce capture for all marketing email sent through Braze.

A note on SendGrid: SendGrid does appear elsewhere in the Outward Bound stack — it powers separate website-related sending work — but it is not the sub-processor for the Braze marketing send flow this document describes. The two should not be conflated.

For context: Braze customers can be on any of three sub-processors. The three options are Amazon SES (the platform default for new setups), SparkPost (our choice), or SendGrid. The high-level email flow is identical across all three; what differs is which IP ranges send the mail, which DNS records get published, and what appears in the Received: headers.

Quick re-verification anytime: Open Braze → Settings → Email Sending → Sending Domains and read the provider listed against c.outwardbound.org. The DKIM record format is also distinctive at a glance — SparkPost publishes DKIM as a TXT record at a selector like scph<date>._domainkey… with the public key inline. SendGrid uses CNAME records pointing to dkim.sendgrid.net; SES uses CNAMEs pointing to amazonses.com.
Illustrative · DNS records and DMARC policy

Specific DNS values shown in §3 (SPF includes, DKIM selectors, the DMARC policy string) are illustrative patterns based on standard Braze + SparkPost documentation. They have not been pulled from a live DNS lookup of outwardbound.org.

Each table that contains illustrative values is flagged with an illustrative badge so they aren't mistaken for verified records.

To confirm with certainty: Run dig TXT _dmarc.outwardbound.org, dig TXT c.outwardbound.org, and a DKIM lookup against the current selector — or use MXToolbox's DMARC / SPF / DKIM lookups against our domains. The actual published values are the source of truth; this document just shows the shape of what should be there.
01 — Anatomy

An email is two messages stacked on top of each other

Every email actually carries two distinct "from" addresses, governed by two different RFCs. Recipients only see one of them; mail servers care mostly about the other. Misalignment between the two is the root cause of every concern this document addresses.

What recipients see (the "header" message)

The visible "from" name, address, subject, and body are RFC 5322 headers. Recipient mail clients render them. The via c.outwardbound.org annotation is Gmail's note that the envelope and header domains don't match exactly — discussed in §5.

What mail servers see (the "envelope")

Visible · RFC 5322
From: 5322.From / Header From
The friendly name and address rendered in the recipient's inbox.
Target value (root-domain From):
Outward Bound USA <giving@outwardbound.org>
Visible · RFC 5322
Reply-To: optional override
If present, clicking Reply uses this address instead of From. If absent, Reply uses From.
Typical setup:
(unset — replies fall back to From)
Envelope · RFC 5321
Return-Path: 5321.From / MAIL FROM / Bounce
Hidden from recipients. Where mail servers deliver bounces (NDRs). What SPF authenticates against.
Stays on subdomain:
bounces-XXXX@c.outwardbound.org
Sub-processor manages this mailbox; never read directly
Envelope · DKIM signature
d= signing domain in DKIM-Signature header
The domain whose private key signed this message. DKIM check confirms the signature is valid against the public key in DNS.
Signs as the subdomain:
d=c.outwardbound.org; s=<selector>
02 — Send flow

From "Send" to recipient inbox

Braze is a customer engagement platform; it does not directly hand packets to the recipient's mail server. The actual MTA work — DKIM signing, IP selection, SMTP delivery, bounce capture — is done by Braze's email sub-processor. For Outward Bound, that's SparkPost. The diagram below traces the handoffs; the cards below the diagram list what gets stamped onto each message and what the recipient checks.

OUR SIDE TRANSIT RECIPIENT SIDE STEP 1 · COMPOSE Braze Workspace Marketer builds campaign, picks segment, schedules send. From: workspace default STEP 2 · SIGN + ROUTE SparkPost DKIM sign, set Return-Path, choose IP, rewrite click links. Braze email sub-processor STEP 3 · DELIVER SparkPost IP pool SMTP handshake from a dedicated or shared IP. Warmed sending reputation IN TRANSIT · DNS LOOKUPS SMTP handshake + authentication queries The recipient mail server receives the message and pulls: SPF TXT on c.outwardbound.org · DKIM TXT at scph<date>._domainkey.c.outwardbound.org DMARC TXT on outwardbound.org (root — inherited by subdomain) STEP 4 · AUTHENTICATE Recipient MTA SPF + DKIM + DMARC checks STEP 5 · RENDER Recipient inbox Display, cache, "via" annotation
What gets stamped onto the message

SparkPost → SMTP delivery

Return-Path: bounces-XXXX@c.outwardbound.org
DKIM-Signature: d=c.outwardbound.org; s=scph<date>
Received: from SparkPost with IP from its pool
Click links: rewritten to a tracking subdomain
What the recipient mail server checks

Recipient MTA → authentication

SPF: is sending IP in c.outwardbound.org's TXT record?
DKIM: does the signature validate against published key?
DMARC: does From align with SPF or DKIM domain?
(under relaxed alignment, a root-domain match is enough)
Our infrastructure (Braze + SparkPost)
In transit · DNS lookups
Recipient MTA
Recipient inbox

Why dedicated sending subdomains exist

Braze (and every modern ESP) strongly recommends sending marketing email from a dedicated subdomain rather than the root domain. This isolates the sending reputation of marketing email from corporate mail (Outlook on outwardbound.org) and transactional mail. If a marketing campaign ever triggers spam complaints, blacklisting, or a deliverability incident, the impact stays on the subdomain — corporate inboxes on the root continue to function unaffected. The letter prefix itself (c. for campaigns, t. for transactional) is a convention; the meaningful work is that each is an isolated sending identity.

02a — Subdomain pattern

One pattern, multiple subdomains

The same architecture described in §2 applies to each Outward Bound sending subdomain. Each gets its own DKIM key pair, its own SPF authorization, and its own bounce-handling path — and each inherits DMARC policy from the root outwardbound.org zone. This is what allows the federation to share a domain while keeping reputations cleanly separated.

Current and planned subdomains

The visible From address for every campaign should sit on the root domain (e.g. giving@outwardbound.org, enroll@cobs.outwardbound.org) — never on the bare sending subdomain. The sending subdomain belongs in the envelope and DKIM, not in front of donors and recipients.

Live
c.outwardbound.org
National marketing & fundraising sends. Donor solicitations, newsletters, lifecycle campaigns. The subdomain at the center of recent deliverability work.
Live
t.outwardbound.org
Transactional & user-triggered email. Receipts, password resets, registration confirmations. Reputation-isolated from marketing — a bad marketing sender doesn't get registration confirmations sent to spam.
Planned
<school>.outwardbound.org
Per-school sending subdomains (e.g. cobs.outwardbound.org for Colorado Outward Bound School). Each school sends with its own DKIM, SPF, and bounce path — but visible From still resolves to a meaningful root-domain address.

DMARC policy inheritance: Because the DMARC record is published on the root outwardbound.org, all current and future subdomains inherit it automatically. No subdomain-level DMARC configuration is required to extend coverage to a new school. New subdomains do still need their own SPF and DKIM records published.

03 — DNS & authentication

What's published where

The recipient mail server's only source of truth about what we authorize is our DNS. The sub-processor provisions records on each sending subdomain (so the root zone's SPF doesn't have to enumerate every ESP), and our root-level DMARC policy governs how mismatches are handled. The DKIM check is what carries the alignment for the visible From address.

c.outwardbound.org illustrative values
Pattern of records on a dedicated sending subdomain · published by SparkPost setup · replace values with what's actually live
TypeHost (pattern)Value patternWhat it does
TXTc.outwardbound.orgv=spf1 include:sparkpostmail.com ~allAuthorizes SparkPost's sending IPs to use this subdomain in the envelope.
TXTscph<date>._domainkey.c.outwardbound.orgv=DKIM1; k=rsa; h=sha256; p=<public key>DKIM public key published directly as a TXT record. SparkPost's convention is to inline the key rather than use a CNAME pointing back to its infrastructure.
CNAME<bounce-host>.c.outwardbound.orgsparkpostmail.comCustom bounce domain — where Return-Path resolves. NDRs land at SparkPost, get classified, and the bounce status flows back to Braze for list hygiene.
outwardbound.org illustrative
Root domain · DMARC policy applies to all subdomains via inheritance
TypeHost (pattern)Value patternWhat it does
TXT_dmarc.outwardbound.orgv=DMARC1; p=<none | quarantine | reject>; adkim=r; aspf=r; rua=mailto:<reporting address>Tells recipients how to handle unauthenticated mail. Relaxed alignment (adkim=r) means a subdomain match counts as alignment for the root. Current policy strictness should be verified.
MXoutwardbound.org<M365 mail protection endpoint>Where replies and human inbound mail to the root domain are delivered. Replies routed to root-domain From addresses land here.
TXToutwardbound.orgv=spf1 include:spf.protection.outlook.com -allRoot SPF — for Outlook-sent corporate mail only. Does NOT need to include the marketing sub-processor (because the envelope from is on the subdomain, not the root).
SPF

Is this IP allowed to send for this domain?

Recipient checks the Return-Path domain's SPF record. If the sending IP appears in c.outwardbound.org's SPF, pass.

Checks against
Return-Path · c.outwardbound.org
DKIM

Was this message signed and unaltered?

Recipient fetches the public key from the TXT record at scph<date>._domainkey.c.outwardbound.org and validates the signature stamped by SparkPost.

Signing domain (d=)
d=c.outwardbound.org
DMARC

Does the From align with what's authenticated?

Recipient compares the visible From domain (outwardbound.org) to SPF and DKIM domains. Under relaxed alignment, subdomain → root match passes.

Outcome with root-domain From
✓ Passes via DKIM alignment (organizational domain match)
04 — Configuration impact

What the From-address change actually does

Only one header changes — the visible From — but it changes everything recipients see, the destination of replies, and what gets cached in their address books. Authentication still passes because DMARC's relaxed alignment treats c.outwardbound.org and outwardbound.org as the same organizational domain.

Misconfigured · From on subdomain

Visible From leaks to the sending subdomain

From: Outward Bound USA <noreply@c.outwardbound.org> Reply-To: (none) Return-Path: bounces-XXXX@c.outwardbound.org DKIM-Signature: d=c.outwardbound.org; s=scph<date> Received: from msg.sparkpostmail.com
Recipient experience: Sees noreply@c.outwardbound.org in the From field. Gmail also shows "via c.outwardbound.org", compounding the impression that something is off.

Reply behavior: Hitting Reply sends to noreply@c.outwardbound.org — an address with no real mailbox behind it.

Address book / autocomplete: Gmail caches the literal From address. Future typing-to-compose autocompletes to the subdomain version.

NDR risk: Replies to @c.outwardbound.org bounce because the subdomain has no inbound MX. Recipient sees an NDR; we never see the original reply.
Correct · From on root domain

Visible From on the root domain

From: Outward Bound USA <giving@outwardbound.org> Reply-To: (none — replies fall back to From) Return-Path: bounces-XXXX@c.outwardbound.org DKIM-Signature: d=c.outwardbound.org; s=scph<date> Received: from msg.sparkpostmail.com
Recipient experience: Sees giving@outwardbound.org — recognizable and brand-aligned. Gmail may still display "via c.outwardbound.org" because the envelope domain is unchanged; a seed send confirms.

Reply behavior: Hitting Reply sends to giving@outwardbound.org — a real M365 mailbox owned by us.

Address book / autocomplete: Gmail caches giving@outwardbound.org. Future autocomplete points to the right inbox.

Authentication: Still passes. DMARC relaxed alignment treats DKIM d=c.outwardbound.org as aligned with the new From at outwardbound.org.
07 — Verification

What to confirm before a live send

A short checklist to run before sending the next campaign on the corrected configuration — and to keep as a paper trail when the same questions resurface later.

Pre-send verification
Seed send to a Gmail account (and an Outlook account if possible). Inspect "Show original" / message source to confirm From, Return-Path, DKIM-Signature, and DMARC result.
Verify the visible From address and display name render as the intended root-domain address in the inbox preview, not the subdomain.
Click Reply on the seed and confirm the To field auto-fills with the root-domain address.
Check for the "via" annotation in Gmail. If present, document for stakeholders so the expectation is set; the annotation is informational and not a deliverability problem.
Verify DMARC result in headers — expect dmarc=pass with header.from on the root domain.
Confirm the workspace default has changed in Braze settings, not just the individual campaign/Canvas, so future campaigns inherit the correct From by default.
Document campaign/Canvas overrides — high-stakes sends (fundraising, donor stewardship) should pin From explicitly so a future workspace setting change can't silently regress this.
Re-verify the sub-processor periodically against Braze settings (see §0). If it ever changes, the DNS patterns in §3 need to be re-pulled from whichever provider is in use.
08 — Glossary & how it fits together

Plain-language glossary

Email deliverability runs on a stack of acronyms. This section defines the ones used throughout this document in everyday terms — what each thing does, and why it matters. The diagram that follows shows how they relate, because the terms only make full sense in relation to one another.

How these pieces fit together

Reading left to right: our systems hand a message off, it travels across the internet, and the recipient’s mail system checks it against records we publish before deciding where it lands.

OUR SYSTEMS THE INTERNET RECIPIENT’S SYSTEM EMAIL PLATFORM (ESP) — BRAZE Builds the campaign and decides who receives it. MAIL TRANSFER AGENT (MTA) The sending engine. Signs the message with DKIM and hands it off using SMTP. DNS — THE PUBLIC RECORD BOOK We publish small records here that tell the world how to treat our mail: SPF  ·  DKIM key  ·  DMARC Anyone can read these to verify us. SMTP delivery RECEIVING MTA Gmail, Outlook, etc. Receives the message and checks it. looks up our records THE THREE CHECKS SPF — from an allowed server? DKIM — signature genuine? DMARC — names aligned? and what to do if a check fails. THE OUTCOME Checks pass → lands in the inbox. Checks fail or look risky → junk, quarantine, or rejected. A rejection produces an NDR (a bounce). an NDR travels back to the sender Every step here follows shared rulebooks called RFCs — which is why mail from any system works with any other.
The flow in one sentence: our email platform decides who to mail, the MTA signs and sends it over SMTP, the receiving system looks up our DNS records to run the SPF, DKIM and DMARC checks, and the message either reaches the inbox or generates an NDR back to us — all of it following shared rulebooks called RFCs.
DNSDomain Name System

The internet’s public directory. It maps domain names to addresses, and it also stores small text records that describe how a domain’s email should be handled.

Why it matters: DNS is where we publish the proof that email claiming to be from outwardbound.org is genuinely ours. Every other check on this list works by reading a record we put in DNS.

MTAMail Transfer Agent

The actual sending engine that transmits email from one server to another. Our email platform (Braze) hands messages to an MTA, which signs them and delivers them; the recipient’s side has its own MTA that receives them.

Why it matters: The MTA is the part that does the technical work of authentication and delivery. When deliverability is discussed, the MTA’s reputation and configuration are usually what’s at stake.

SMTPSimple Mail Transfer Protocol

The shared language mail servers use to hand email to one another across the internet. When one MTA passes a message to the next, it happens over SMTP.

Why it matters: SMTP is the “road” email travels on. It is also what carries the envelope information — including the hidden return address where bounces are sent.

SPFSender Policy Framework

A DNS record listing which servers are allowed to send email for a domain. The receiving system checks whether the message arrived from a server on that approved list.

Why it matters: SPF answers the question “was this sent from a server we authorized?” It is one of the two ways a recipient confirms an email is legitimately ours.

DKIMDomainKeys Identified Mail

A tamper-proof digital signature added to every message. The MTA signs the email with a private key; the recipient checks that signature against a matching public key we publish in DNS.

Why it matters: DKIM answers “is this genuinely from us, and was it altered in transit?” In our setup, DKIM is the check that lets the visible address stay on the root domain while sending happens on the subdomain.

DMARCDomain-based Message Authentication, Reporting & Conformance

A DNS policy that ties SPF and DKIM together. It tells receiving systems two things: whether the visible “from” address lines up with what SPF and DKIM verified, and what to do with mail that fails — accept, quarantine, or reject.

Why it matters: DMARC is the rule that decides the consequence. Its “relaxed alignment” setting is what allows a subdomain and the root domain to count as the same organization — the technical basis for the fix in this document.

NDRNon-Delivery Report

The automated “bounce” message returned when an email cannot be delivered — because an address is invalid, a mailbox is full, or a system rejected it.

Why it matters: NDRs are how senders learn delivery failed. In this document they appear twice: as normal bounce handling the platform manages, and as the failure that happens when someone replies to a send-only subdomain address.

RFCRequest for Comments

The published technical standards that define how internet systems work. Email’s core behaviors — message format, addressing, delivery — are each specified in an RFC.

Why it matters: RFCs are the reason email from any provider works with any other. This document refers to them when distinguishing the visible “from” address (one RFC) from the hidden envelope address (another).

ESPEmail Service Provider

The platform used to design, manage, and send marketing or lifecycle email to a list of people — in our case, Braze.

Why it matters: The ESP is where campaigns are built and where the visible “from” address is configured. The ESP relies on an MTA underneath it to do the actual sending.

Sub-processor

A third-party service that an ESP relies on to perform part of its job. Braze uses a sending sub-processor as its MTA — for Outward Bound, that is SparkPost.

Why it matters: It explains why “sending from Braze” really means Braze plus a sub-processor. The sub-processor’s infrastructure is what appears in the technical delivery records.

Sending subdomain

A dedicated branch of the domain — such as c.outwardbound.org — used only for sending bulk email, kept separate from the main domain that runs staff mail and the website.

Why it matters: Separation protects the main domain’s reputation. But a sending subdomain is built to send only — it has no inbox — which is exactly why replies to it fail.

Quarantine

A holding area where a mail system places suspicious messages — not the inbox, and not always the visible junk folder. Messages can sit there unseen by the recipient.

Why it matters: Quarantine is why “I checked my junk and it isn’t there” does not mean a message was delivered. It can be held administratively, out of sight.

IP warming

The practice of gradually increasing email volume from a new sending address or server, so receiving systems learn to trust it instead of treating a sudden surge as suspicious.

Why it matters: A brand-new sending domain starts with no reputation. Warming explains why the earliest sends underperform and why a measured ramp-up is part of the plan.

Return-Pathalso: envelope address, bounce address

The hidden address an email is technically sent “from” at the delivery layer — separate from the visible “from” a recipient sees. Bounces (NDRs) go here.

Why it matters: Email carries two “from” addresses. The Return-Path on the sending subdomain is correct and normal; the problem is only when the visible from also shows the subdomain.