<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal">I don’t know if anyone else may have encountered this issue, but our university recently implemented Outlook 365’s Threat Management/Email Quarantine. This implementation has had the unfortunate consequence of catching emails sent from
our content providers like Proquest, EBSCO, Cengage, Clarivate, etc. For example. PQ’s Refworks requires users to set up an account. Upon doing this, Refworks sends out a confirmation email. These emails were getting caught and not released until the next
day. Now, we discovered the RefWorks problem, and got our new security admin to whitelist the necessary domain. However, we subsequently discovered that it is affecting things like students and faculty trying to email themselves articles or a list of citations
from one of our databases.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">I am aware that many of our content providers have lists of URLs that should be whitelisted to avoid the kinds of problems I described above. However, as we get content from multiple vendors who may have multiple URLs that should be whitelisted,
we are talking about a lot of URLs. Our security administrator is unwilling to whitelist all of these URLs. He says that it offers too many opportunities for unauthorized users to gain access to our network.
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Has anyone else encountered this sort of issue? Thoughts or suggestions would be appreciated.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Michael Peters, MSIS<o:p></o:p></p>
<p class="MsoNormal">E-Resources Librarian<o:p></o:p></p>
<p class="MsoNormal">J.E. & L.E. Mabee Library<o:p></o:p></p>
<p class="MsoNormal">University of the Incarnate Word<o:p></o:p></p>
<p class="MsoNormal">4301 Broadway, CPO# 297<o:p></o:p></p>
<p class="MsoNormal">San Antonio, TX 78209<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>