Why is Office365 automatically opening and clicking emails?

Summary

Office365's automatic opening and clicking of emails is a multifaceted issue predominantly driven by security measures and scanning processes. Microsoft's Advanced Threat Protection (ATP) with Safe Links, along with URL rewriting and detonation by various security solutions (Proofpoint, Cisco Talos, SANS Institute), contribute to artificial clicks as URLs are analyzed for malicious content. Additionally, corporate email systems scan for viruses/malware, and email clients may pre-fetch images or validate links, further inflating engagement metrics. While designed to protect users, these automated interactions can skew marketing data, impacting analytics costs and potentially sender reputation. Experts suggest data filtering (by User Agent or IP address) and avoiding unwise use of unsubscribe links as mitigation strategies, but acknowledge that a complete solution remains elusive.

Key findings

  • ATP & Safe Links: Microsoft ATP with Safe Links scans URLs at time of click, generating false positives.
  • URL Rewriting: Security solutions rewrite URLs to scan for malicious content before redirection.
  • Sandbox Detonation: Email security systems detonate URLs in sandboxes to analyze behavior.
  • Malware Scanning: Corporate email systems scan for viruses/malware, opening links.
  • Image Caching & Link Validation: Email clients pre-fetch images and validate links, triggering opens/clicks.
  • Data Skewing: Automated processes skew email marketing metrics.
  • Reputation Impact: Automated clicks can negatively impact sender reputation if not properly managed.
  • B2B Prevalence: This issue is common in the Enterprise/B2B space.

Key considerations

  • Data Filtering: Clean and filter data based on User Agent or IP address to remove automated clicks.
  • Analytics Monitoring: Monitor analytics for unusual activity, as these clicks can impact marketing analysis.
  • Unsubscribe Management: Avoid 1-click unsubscribe links to prevent accidental unsubs due to automated clicks.
  • Security vs. Metrics: Recognize the trade-off between security and accurate email engagement data.
  • Mitigation Challenges: Solving the root cause is difficult; adaptive strategies are needed to manage effects.

What email marketers say
12Marketer opinions

Office365 automatically opens and clicks emails primarily due to security measures implemented by Microsoft and other email security vendors. These measures include Safe Links in Office 365 ATP, URL rewriting by security solutions, automated detonation in sandbox environments, and virus/malware scanning. Additionally, image caching by email clients and link validation checks can also contribute to inflated open and click rates. These automated interactions are designed to protect users, but they can skew email marketing metrics and potentially impact sender reputation if not properly managed.

Key opinions

  • Security Scanning: Office 365 ATP and other security solutions proactively scan URLs, leading to automated clicks.
  • URL Rewriting: Security vendors rewrite URLs to analyze them before redirecting users, causing clicks.
  • Automated Detonation: Email security systems detonate URLs in sandbox environments, generating clicks and opens.
  • Malware Scanning: Corporate email systems scan for viruses and malware, opening links and registering clicks.
  • Image Caching: Email clients cache images, triggering opens even without user interaction.
  • Link Validation: Security tools validate links, automatically clicking them to ensure validity.
  • Bot Mitigation: Bot mitigation solutions click links to profile senders and assess risk.
  • Anti-virus Scanning: Anti-virus software may scan links, causing automatic clicks.

Key considerations

  • Data Filtering: Clean and filter data to remove automated clicks and opens to improve metric accuracy.
  • Sender Reputation: Monitor and manage sender reputation, as automated clicks can negatively impact it.
  • Metric Skewing: Recognize that automated clicks can skew email marketing metrics, requiring adjustments in analysis.
  • Deliverability Impact: Implement strategies to mitigate the impact of automated clicks on deliverability.
  • Unsubscribe Links: Avoid using 1-click unsubscribe links in the body of the email to prevent accidental unsubscribes.
Marketer view

Email marketer from Reddit shares that some email clients cache images by pre-fetching them from the server. This process of pre-fetching can register as an 'open' even if the recipient hasn't actually viewed the email.

November 2024 - Reddit
Marketer view

Email marketer from Litmus explains that some email clients or security tools perform link validation checks. These tools might automatically click on links in an email to ensure they are valid and safe, thus inflating click rates.

June 2024 - Litmus
Marketer view

Marketer from Email Geeks shares that Office365 hosted domains opening and clicking on emails automatically is very common in the Enterprise / B2B space, and becoming more common in the B2B space.

May 2023 - Email Geeks
Marketer view

Email marketer from Super User forum shares that Anti-virus software could also be a reason as some AV programs scan links within emails.

July 2021 - Super User
Marketer view

Email marketer from Email on Acid shares that security systems may pre-fetch and scan links in emails to protect users. This pre-fetching action triggers a click before the user interacts with the email.

September 2024 - Email on Acid
Marketer view

Marketer from Email Geeks explains that you can clean your data up and learn to filter it out if your ESP can't. Also avoid 1-click unsubscribe in the *body.*

March 2023 - Email Geeks
Marketer view

Email marketer from Microsoft Support explains that Office 365 Advanced Threat Protection (ATP) includes Safe Links, which proactively scans URLs in emails at the time of click. This can result in URLs being visited by Microsoft's systems, leading to false-positive clicks.

July 2023 - Microsoft Support
Marketer view

Email marketer from Proofpoint shares that security solutions rewrite URLs to point to their scanning infrastructure. When users click these rewritten links, the security vendor analyzes the destination page for malicious content before redirecting the user, creating a 'click' even if the user doesn't fully load the page.

March 2023 - Proofpoint
Marketer view

Email marketer from Gmass explains that If the recipient of your emails is using Gmail, the Gmass tracking pixel will always show the location of where the email was opened.

November 2023 - Gmass
Marketer view

Email marketer from Marketing Land shares that automated clicks can negatively impact sender reputation if not correctly filtered, potentially leading to deliverability issues.

February 2025 - Marketing Land
Marketer view

Email marketer from Email Vendor Guide shares that bot mitigation solutions, such as those implemented by email security vendors, may click on links to profile email senders and assess risk. These clicks, even if performed by bots, can skew email marketing metrics.

July 2021 - Email Vendor Guide
Marketer view

Email marketer from Stack Overflow explains that corporate email systems often scan incoming emails for viruses and malware. This scanning process may involve opening links within the email, which would register as a click and, in some cases, an open.

September 2024 - Stack Overflow

What the experts say
6Expert opinions

Experts confirm that Office365 automatically opening and clicking emails is a known issue. This behavior seems to be influenced by Microsoft's internal processes, potentially involving AI training or cyclical testing of senders, even those with good reputations. While the specific triggers remain unclear, it primarily impacts metrics and can lead to inflated analytics costs. Addressing this issue is difficult, but filtering data based on User Agent or IP address may provide some relief. Avoiding unwise use of unsubscribe links is also advised.

Key opinions

  • Confirmed Issue: Office365 auto opens and clicks are a confirmed issue affecting many senders.
  • Microsoft's Internal Processes: Microsoft seems to be cycling through senders, potentially for AI training or testing.
  • Unclear Triggers: The exact triggers for this behavior are not fully understood.
  • Metrics Impact: This behavior primarily impacts email marketing metrics, leading to inaccurate data.
  • Analytics Costs: Inflated analytics costs can result from the increased volume of automated opens and clicks.

Key considerations

  • Data Filtering: Filter data based on User Agent or IP address to mitigate the impact on metrics.
  • Unsubscribe Links: Avoid implementing 1-click unsubscribe links to prevent accidental unsubscribes due to automated clicks.
  • Limited Solutions: Solving the root cause of this issue is difficult, requiring adaptive strategies to manage its effects.
Expert view

Expert from Email Geeks shares they’ve also seen other people Suddenly Surprised by O365 doing this and it feels like there’s something about their mail or behaviour that triggers the sudden interest.

December 2024 - Email Geeks
Expert view

Expert from Email Geeks confirms the issue of Office365 auto opens and clicks.

May 2023 - Email Geeks
Expert view

Expert from Word to the Wise shares that click and open issues are often a problem and can't easily be solved. You can try to filter out the data where the User Agent is the same, or the IPs are the same within a short period of time.

September 2021 - Word to the Wise
Expert view

Expert from Email Geeks shares that Microsoft seems to be cycling through senders and even good senders are seeing this behavior from them. Not sure if it's behavior related or if it's just them training their AI or something.

March 2024 - Email Geeks
Expert view

Expert from Email Geeks shares one client that was paying for analytics on the website had their bill kinda went a little bonkers when Microsoft targeted them.

September 2022 - Email Geeks
Expert view

Expert from Email Geeks explains that unless you’re doing something unwise with unsub clicks, the worst effect will probably be messing up your metrics (and maybe load on your image servers, redirect servers, but they’d have to be pretty underspecced for that to be a big problem).

February 2025 - Email Geeks

What the documentation says
3Technical articles

Office365 automatically opens and clicks emails because of security mechanisms like URL detonation in sandbox environments and Safe Links verification. These systems rewrite and check URLs in emails to protect users from malicious content. While effective, these automated processes generate artificial clicks and opens, as no real user interaction occurs.

Key findings

  • URL Detonation: Security systems detonate URLs in sandboxes to analyze their behavior, generating automated clicks.
  • Safe Links Verification: Microsoft's Safe Links rewrites and checks URLs for malicious content, triggering clicks during verification.
  • Automated Processes: These processes are automated and don't involve real user interaction, leading to artificial opens and clicks.

Key considerations

  • Metric Distortion: Be aware that security mechanisms can distort email marketing metrics.
  • Security Trade-off: Recognize the trade-off between enhanced security and potential inaccuracies in email engagement data.
  • Filtering Strategies: Explore filtering strategies to mitigate the impact of automated clicks on your metrics.
Technical article

Documentation from Microsoft clarifies that Safe Links in Microsoft Defender for Office 365 helps protect your organization by providing time-of-click verification of web addresses (URLs) in email messages and Office documents. Each URL is rewritten and checked against a list of known malicious links, potentially triggering a 'click' during the verification process.

May 2022 - Microsoft Learn
Technical article

Documentation from SANS Institute details that URL detonation is a common technique where security systems automatically visit URLs in emails in a controlled environment (sandbox) to check for malicious behavior, resulting in automated clicks.

May 2022 - SANS Institute
Technical article

Documentation from Cisco Talos explains that many email security systems detonate URLs in a sandbox environment to analyze their behavior. These automated detonations result in recorded clicks and opens, even though a real user did not interact with the email.

February 2024 - Cisco Talos