free security tools

How to Check If Your Email Is Protected with SPF, DKIM and DMARC

May 24, 20268 min read

If you own a domain and use email, you need three DNS records to keep your messages out of spam folders and prevent impersonation: SPF, DKIM, and DMARC. Without them, anyone can send forged emails from your domain (phishing, spoofing).

This guide walks you through checking whether your domain has them configured correctly using the Email Security Checker from SecuriTool, and how to interpret each result.

โœ… Open the checker in another tab while you read:

Email Security Checker โ†’

What Are SPF, DKIM, and DMARC?

These three email authentication mechanisms work together. None is sufficient on its own:

RecordWhat It DoesWhat It Protects Against
SPFLists the servers authorized to send email for your domainAnyone sending from an unauthorized IP
DKIMDigitally signs emails with a public key in your DNSMessage tampering in transit
DMARCTells receivers what to do when SPF or DKIM fail (none/quarantine/reject)Direct domain spoofing and phishing

Step 1: Open the Email Security Checker

Navigate to the Email Security Checker. You will see a single input field for a domain name.

Important: The entire analysis runs in your browser via DNS-over-HTTPS. No data is sent to any server โ€” not your domain, not the results.

Step 2: Enter Your Domain

Type the domain you want to check (for example, example.com) and click "Check". The tool queries DNS records and displays results within seconds.

Step 3: Interpret the Results

SPF

A correct SPF record looks like this:

v=spf1 include:_spf.google.com ~all

What to look for:

๐Ÿ”ง How to Fix SPF

For Google Workspace, add this TXT record to your DNS:

v=spf1 include:_spf.google.com ~all

For Microsoft 365:

v=spf1 include:spf.protection.outlook.com ~all

Once verified, change ~all to -all to reject unauthorized senders.

DKIM

DKIM requires two parts: a public key in your DNS (generated by your email provider) and signing enabled on your mail server.

What to look for:

๐Ÿ”ง How to Set Up DKIM

In Google Workspace: Admin โ†’ Apps โ†’ Gmail โ†’ Authenticate email โ†’ Generate new record. Copy the TXT record to your DNS.

In Microsoft 365: Admin portal โ†’ Exchange โ†’ Protection โ†’ DKIM โ†’ Enable and rotate keys.

DMARC

DMARC is the policy that decides what happens when SPF or DKIM fail. Without DMARC, attackers can spoof your domain even if you have SPF and DKIM.

A typical DMARC policy:

v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com

What to look for:

PolicyMeaningWhen to Use
p=noneMonitor only, no blockingFirst few days to ensure no false positives
p=quarantineSuspicious emails go to spamTransition phase after monitoring
p=rejectEmails failing SPF/DKIM are rejectedGoal state. Full protection

๐Ÿ”ง How to Implement DMARC Gradually

  1. Week 1: v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com โ€” observe only
  2. Week 2: Review DMARC reports (sent to the rua email). If clean, escalate to p=quarantine
  3. Week 3: Move to p=reject โ€” full spoofing protection

BIMI (Bonus)

BIMI displays your brand logo next to verified emails in Gmail and Apple Mail. The tool checks this too.

Requirements for BIMI:

Complete Example

Here is what results look like for a well-configured domain:

๐Ÿ“ง Email Security Report โ€” example.com

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘ SPF:  โœ… Pass                      โ•‘
โ•‘       v=spf1 include:_spf.google.com ~all โ•‘
โ• โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ
โ•‘ DKIM: โœ… Valid (selector: google)  โ•‘
โ•‘       RSA 2048 bits                โ•‘
โ• โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ
โ•‘ DMARC: โœ… Pass (p=reject)          โ•‘
โ•‘       rua: mailto:dmarc@example.comโ•‘
โ• โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ
โ•‘ BIMI: โœ… Logo found                โ•‘
โ•‘       selectors: google,_domainkey โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
๐Ÿ“Š Grade: A+

The overall Grade summarizes the state of all three mechanisms. An A or A+ means all three are properly configured.

FAQ

How often should I check my configuration?

At least once a month. Email providers change their servers (Google, Microsoft) and your records may become outdated. Also check after changing email providers or hosting.

Can I have SPF without DMARC?

Yes, but it is not recommended. DMARC is the only mechanism that tells the receiver what to do when SPF or DKIM fails. Without it, each server decides independently โ€” and many will still deliver fraudulent email.

What does "too many DNS lookups" mean in SPF?

The standard allows a maximum of 10 DNS lookups per SPF check. Each include:, redirect=, or mx counts as one. If you exceed 10, servers may ignore your SPF entirely.

Does the checker store my domain?

No. All analysis runs in your browser via DNS-over-HTTPS. No data is sent to any server. Verify this by opening developer tools (F12 โ†’ Network tab) while running a check.

Conclusion

SPF, DKIM, and DMARC are the foundation of email security. Configuring them correctly protects your domain against spoofing, improves deliverability, and is a requirement for any organization using professional email.

Use the Email Security Checker to test your domain now โ€” it takes under a minute and is completely private.

๐Ÿ” Check your domain now:

Email Security Checker โ†’

Published May 24, 2026 ยท Practical Guide ยท SecuriTool