Understanding SPF, DKIM, and DMARC: A Complete Guide
by

Protect your email communications with SPF, DKIM and DMARC. Safeguard against email spoofing and ensure secure, trusted interactions. Get started today!
SPF, DKIM, and DMARC are the three main email authentication protocols. Together SPF, DMARC and DKIM prevent unauthorized sources from using your domain to send fraudulent emails to your prospects, clients, employees, third-party vendors, stakeholders, etc. SPF and DKIM help demonstrate the email’s legitimacy while DMARC instructs the receiver’s email server on what to do with emails failing authentication checks.
Key Takeaways
Email authentication is the process of verifying the legitimacy of email sources. This is an essential security measure taken by organizations to ensure only legitimate senders can send emails on behalf of their domain. SPF, DKIM and DMARC form the pillars of email authentication by verifying sending sources, and email content and defining how to respond to messages failing authentication.
Verizon’s DBIR report suggests that 94% of all cyberattacks start with an email! This further highlights the growing threat of spoofing and its prolific nature.
Email authentication is the first line of defense against email spoofing. Email spoofing is the process of forging domain names and email addresses with malicious intent. Spoofed emails are sent by attackers impersonating legitimate businesses to defraud unsuspecting victims. By verifying the legitimacy of sending sources, authentication prevents forged emails from being delivered. Customers have reported more than 90% decrease in spoofing attempts from their own domain after implementing email authentication protocols.
Email authentication is important for protecting your brand against email-based cyberattacks attempted using phishing and impersonation techniques. Email authentication primarily relies on SPF, DKIM and DMARC protocols, along with additional protocols like MTA-STS, BIMI and ARC that can enhance your security even more! Here’s why you need to implement them:
SPF, DKIM, and DMARC checks can be made by verifying that the records are stored in your Domain Name System or DNS. The DNS is popularly termed as the internet’s phonebook converting domain names to their corresponding IP addresses. The DNS is used as a database for storing your domain’s information in the form of DNS records.
An SPF, DKIM, and DMARC check is used to review existing DNS records that you can publish and store in your DNS. During email authentication checks, receiving MTAs query your DNS to lookup these records and take action based on the instructions or information defined in them. You can use PowerDMARC’s free SPF record checker, DKIM record checker, and DMARC record checker to instantly see if your DNS contains these records!
Follow these instructions to set up SPF, DKIM and DMARC to protect your domain and emails.
Sender Policy Framework or SPF is an email authentication protocol where domain owners enlist all the servers allowed to send emails using their domain. This is done by creating a TXT SPF record that is published on the DNS. If a sending IP is not on the list, authentication fails, and the email maybe marked as spam or suspicious. However, SPF has a few limitations; it breaks when a message is forwarded or the 10 DNS lookup limit is exceeded.
If you already have an SPF record, you can use our SPF record checker to ensure it’s error-free.
Wait for a few hours for the changes to be implemented. Once done, you can use our SPF record lookup tool to ensure an error-free record.
When learning the challenges with SPF, DKIM, and DMARC it is worth noting there are a few common challenges domain owners face specifically with SPF implementation. They are as follows:
To resolve these errors, SPF records should be optimized with Macros to stay under the defined limits. Combining SPF with DKIM and DMARC also ensures smoother authentication and deliverability.
DomainKeys Identified Mail or DKIM lets domain owners automatically sign emails sent from their domain. DKIM works is ways similar to how you sign bank checks to validate their authenticity. DKIM signatures ensure your email content remains secure and unchanged during the delivery process.
It proceeds by storing a public key in a DKIM DNS record. The receiving mail server can access this record to get the public key. On the other hand, there’s a private key secretly stored by the sender who signs the email header with it. Receiving mail servers verify the sender’s private key by comparing it with the easily accessible public key.
Finally, verify your DKIM public key using a DKIM lookup tool to ensure that it is correct.
When looking at adding SPF, DKIM, and DMARC authentification, DKIM specifically has several benefits in email authentication including:
Domain-based Message Authentication, Reporting and Conformance or DMARC instructs the receiver’s server on what to do with emails failing SPF, DKIM, or both. The action taken by the receiver depends on the DMARC policy configured by the sender – none, quarantine, or reject.
DMARC policies are set in a DMARC record which also stores instructions to send reports to domain administrators about all the emails passing or failing validation checks. If you have already implemented a DMARC policy, use our free DMARC record lookup tool to verify if it’s correct.
Check your DMARC implementation using a DMARC checker to validate your configurations.
There are 3 types of DMARC policies domain owners can configure to take action against unauthenticated emails. They are as follows:
Your DMARC policy actions play an important role in preventing email-based threats. With enforced policies in place, domain owners are better protected against spoofing and phishing attacks.
Email authentication does not end at SPF, DKIM and DMARC. To further enhance your domain and email security, you can implement advanced authentication techniques. Let’s discuss some of them:
The MTA-STS protocol for authentication ensures TLS-encrypted delivery of email messages to your inbox. It prevents man-the-middle and DNS spoofing attacks, by negotiating an encrypted SMTP connection between communicating email servers.
BIMI, or Brand Indicators for Message Identification, helps companies attach their brand logos to emails. It acts as a visual verification and authentication, improving brand recall and credibility.
ARC (Authenticated Received Chain) creates a fallback mechanism during email forwarding, by helping preserve original SPF and DKIM authentication headers. This prevents unnecessary authentication failures for forwarded messages.
Once you are confident with your DMARC setup, you can implement these techniques in phase 2 of your email authentication journey.
These advanced setups are ideal for all organizations who want to establish their brand credibility and improve their email reputation even further. They help provide additional security on top of a basic authentication setup – which makes you better equipped to fight against sophisticated cyber attacks.
Once you have implemented your SPF, DKIM and DMARC protocols, it’s now time to monitor and maintain them to ensure everything works properly. Here are some ways to maintain your authentication setup:
DMARC monitoring tools are cloud-based AI-powered platforms that allow instant and easy monitoring of your email authentication implementations from a single interface.
Analyzing your DMARC reports can provide a wealth of information about email authentication results and your domain’s sending sources. This can help detect inconsistencies and prevent spoofing attempts.
It’s important to regularly check your SPF, DKIM and DMARC and advanced authentication techniques to ensure they are functioning properly. SPF may require periodic updates to include new sending sources, DKIM keys need to be rotated frequently to improve security, and DMARC policies need to be enforced to prevent cyber attacks. Without updates or proper maintenance, your implementations may be rendered ineffective.
Once you have set up these security protocols for your domain, you need to start monitoring your reports to notice suspicious activities. By properly configuring and managing these protocols, you can significantly improve your domain security and deliverability.
Remember, together these authentication protocols can reduce the risk of phishing, but they don’t shield against all email-based cybercrime. Thus, it’s important to follow it up with employee education and awareness.
Can I create DMARC without SPF and DKIM?
The answer is no. To set up DMARC, either SPF or DKIM needs to be implemented first. Without SPF or DKIM, your DMARC configuration will not work.
Does DMARC require both SPF and DKIM?
DMARC does not require both SPF and DKIM. Either of the protocols can be set up before setting up DMARC. However, we recommend implementing both for enhanced security.
Does Gmail use SPF or DKIM?
Yes. Gmail’s updated sender guidelines require all senders to implement either SPF or DKIM to successfully send emails to Gmail inboxes.
Can a domain have 2 DKIM records?
A domain can have 2 or more DKIM records with different selectors so that receiving servers can easily locate the right DKIM record during authentication.
How do I know if the protocols are enabled?
To know whether your authentication protocols are enabled for your domain, you can use our DNS record checker tools in Powertoolbox, or analyze your email headers.
Tools
Product
Company