If you own a domain and use email, you need three DNS records to keep your messages out of spam folders and prevent impersonation: SPF, DKIM, and DMARC. Without them, anyone can send forged emails from your domain (phishing, spoofing).
This guide walks you through checking whether your domain has them configured correctly using the Email Security Checker from SecuriTool, and how to interpret each result.
โ Open the checker in another tab while you read:
Email Security Checker โThese three email authentication mechanisms work together. None is sufficient on its own:
| Record | What It Does | What It Protects Against |
|---|---|---|
| SPF | Lists the servers authorized to send email for your domain | Anyone sending from an unauthorized IP |
| DKIM | Digitally signs emails with a public key in your DNS | Message tampering in transit |
| DMARC | Tells receivers what to do when SPF or DKIM fail (none/quarantine/reject) | Direct domain spoofing and phishing |
Navigate to the Email Security Checker. You will see a single input field for a domain name.
Important: The entire analysis runs in your browser via DNS-over-HTTPS. No data is sent to any server โ not your domain, not the results.
Type the domain you want to check (for example, example.com) and click "Check". The tool queries DNS records and displays results within seconds.
A correct SPF record looks like this:
v=spf1 include:_spf.google.com ~all
What to look for:
~all: SPF exists but is not strict โ unauthorized servers are marked as suspicious but not rejected.For Google Workspace, add this TXT record to your DNS:
v=spf1 include:_spf.google.com ~all
For Microsoft 365:
v=spf1 include:spf.protection.outlook.com ~all
Once verified, change ~all to -all to reject unauthorized senders.
DKIM requires two parts: a public key in your DNS (generated by your email provider) and signing enabled on your mail server.
What to look for:
In Google Workspace: Admin โ Apps โ Gmail โ Authenticate email โ Generate new record. Copy the TXT record to your DNS.
In Microsoft 365: Admin portal โ Exchange โ Protection โ DKIM โ Enable and rotate keys.
DMARC is the policy that decides what happens when SPF or DKIM fail. Without DMARC, attackers can spoof your domain even if you have SPF and DKIM.
A typical DMARC policy:
v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com
What to look for:
p=none): DMARC exists but enforces nothing. Useful for initial testing, but does not actively protect.| Policy | Meaning | When to Use |
|---|---|---|
p=none | Monitor only, no blocking | First few days to ensure no false positives |
p=quarantine | Suspicious emails go to spam | Transition phase after monitoring |
p=reject | Emails failing SPF/DKIM are rejected | Goal state. Full protection |
v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com โ observe onlyp=quarantinep=reject โ full spoofing protectionBIMI displays your brand logo next to verified emails in Gmail and Apple Mail. The tool checks this too.
Requirements for BIMI:
p=reject or p=quarantineHere is what results look like for a well-configured domain:
๐ง Email Security Report โ example.com โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ SPF: โ Pass โ โ v=spf1 include:_spf.google.com ~all โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฃ โ DKIM: โ Valid (selector: google) โ โ RSA 2048 bits โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฃ โ DMARC: โ Pass (p=reject) โ โ rua: mailto:dmarc@example.comโ โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฃ โ BIMI: โ Logo found โ โ selectors: google,_domainkey โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ ๐ Grade: A+
The overall Grade summarizes the state of all three mechanisms. An A or A+ means all three are properly configured.
At least once a month. Email providers change their servers (Google, Microsoft) and your records may become outdated. Also check after changing email providers or hosting.
Yes, but it is not recommended. DMARC is the only mechanism that tells the receiver what to do when SPF or DKIM fails. Without it, each server decides independently โ and many will still deliver fraudulent email.
The standard allows a maximum of 10 DNS lookups per SPF check. Each include:, redirect=, or mx counts as one. If you exceed 10, servers may ignore your SPF entirely.
No. All analysis runs in your browser via DNS-over-HTTPS. No data is sent to any server. Verify this by opening developer tools (F12 โ Network tab) while running a check.
SPF, DKIM, and DMARC are the foundation of email security. Configuring them correctly protects your domain against spoofing, improves deliverability, and is a requirement for any organization using professional email.
Use the Email Security Checker to test your domain now โ it takes under a minute and is completely private.
๐ Check your domain now:
Email Security Checker โPublished May 24, 2026 ยท Practical Guide ยท SecuriTool