Best practices to implement when you suspect you have a mass-mailer in your environment.