Quick, practical steps to authenticate your domain with SPF, DKIM, and DMARC so fewer junk messages ever reach the bot.
Last updated:
p=none
with reports; then move to quarantine
→ reject
.SPF is a DNS TXT record that lists the servers allowed to send mail from your domain.
v=spf1 include:_spf.yourmailhost.tld ip4:203.0.113.5 -all
-all
(hard fail) once you’re sure the list is complete. Use ~all
while testing.include:
chains; SPF lookups are limited (10 DNS lookups).DKIM adds a cryptographic signature to each message so receivers can verify it wasn’t altered and truly came from you.
<selector>._domainkey.yourdomain.com
.DMARC tells receivers how to treat messages that fail SPF/DKIM and gives you reporting.
_dmarc.yourdomain.com TXT "v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; fo=1; pct=100; adkim=s; aspf=s"
p=none
collects reports without blocking. Review for 1–2 weeks.p=quarantine
, then p=reject
once green.ruf=mailto:dmarc-forensics@yourdomain.com
for failure samples (privacy-sensitive).yourdomain.com TXT "v=spf1 include:_spf.hostedmail.com include:send.example.net -all"
selector1._domainkey TXT "v=DKIM1; k=rsa; p=MIIBIjANBgkqh..."
_dmarc TXT "v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com; adkim=s; aspf=s"
notify.yourdomain.com
).BIMI can display your logo in some inboxes after you enforce DMARC. You’ll publish a DNS record with a logo URL and (often) a Verified Mark Certificate.