Email Authentication: A Practical Guide
Note: This is general information and not legal advice.
On this page
Executive Summary
p=none (monitor) to quarantine and ultimately reject when ready. Ongoing monitoring with reports, sender tracking, and drift control.The quick definitions
SPF (Sender Policy Framework) publishes a DNS record listing which servers and services are allowed to send mail for your domain. When a receiving mail server gets a message claiming to be from you, it checks your SPF record to verify the sending server is authorized. If not, the message may be flagged or rejected.
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to outgoing messages. The public key is published in DNS, and receiving servers use it to validate that the message wasn't altered in transit and genuinely originated from your domain. DKIM signs the content, so even if an attacker relays through an authorized server, a modified message will fail verification.
DMARC ties SPF and DKIM results to the visible "From" domain through a concept called alignment. It publishes a policy (none, quarantine, or reject) that tells receivers what to do with messages that fail authentication, and it generates aggregate and forensic reports so you can see who's sending mail as you and whether it's passing or failing.
MTA-STS (SMTP MTA Strict Transport Security) and TLS-RPT (TLS Reporting) address the transport layer. MTA-STS publishes a policy requiring encrypted TLS connections to your mail servers, preventing STARTTLS downgrade attacks where an attacker forces a connection to fall back to unencrypted plaintext. TLS-RPT provides reporting on TLS delivery failures so you can identify and fix encryption gaps.
Common failure modes
Unknown senders are the most common failure mode. Marketing tools, CRMs, invoicing platforms, ticketing systems, and HR tools often send mail from your domain without being included in SPF or DKIM configuration. These third-party senders accumulate over years, and each one is a potential authentication failure that blocks legitimate mail when you enforce DMARC.
SPF bloat happens when too many include lookups push the record past DNS lookup limits, causing permanent errors (permerrors) that make all your mail fail SPF validation. DKIM drift occurs when vendors change their signing configuration or rotate selectors without notifying you, breaking DKIM until DNS is updated. DMARC gets stuck at p=none indefinitely in organizations that collect reports but never act on them, meaning spoofing remains possible.
Moving to quarantine or reject without validating all senders first will break legitimate mail. Subdomains are often left unmanaged while the root domain is protected, giving attackers a weaker target. Each of these failures is fixable, but they require intentional inventory work and staged enforcement rather than a single configuration change.
Why you should care (business outcomes)
Spoofing attacks cost real money. When an attacker sends a "CEO requests a wire transfer" email from your domain, it damages relationships with customers and vendors, can lead to direct financial loss, and erodes trust in your organization's communications. Email authentication makes these attacks harder to execute and gives you visibility when someone is trying.
DMARC reporting provides investigative signal. If someone is spoofing your domain, the aggregate reports show which IP addresses are sending mail as you, what volume they're sending, and whether those messages pass or fail authentication. This helps you identify patterns, block sources, and in some cases work with law enforcement or the hosting providers involved.
Deliverability protection is a longer-term benefit. When authentication is consistent, receiving mail servers develop more confidence in your mail. Over time, this means your legitimate communications are more likely to reach inboxes rather than spam folders. The inverse is also true: domains with poor authentication reputation often see their mail silently filtered, and senders may not realize it's happening.
Subdomain strategy (marketing, invoices, apps)
One practical approach is to use purpose-built subdomains for third-party sending and high-risk workflows, like mail.example.com for marketing tools or billing.example.com for invoicing platforms, while keeping your primary domain tightly controlled. This provides containment: if a vendor's configuration breaks or gets abused, the impact is limited to that subdomain rather than affecting your core domain reputation.
Subdomain strategies also improve clarity and governance. It's easier to track "who sends what" when each workflow has its own subdomain with its own SPF/DKIM/DMARC configuration. You can apply stricter policies to core domains and tailored policies to vendor subdomains based on risk. The caveat is that subdomains still need governance. Moving the problem to a subdomain without managing it just relocates the failure mode.
Rollout approach (safe, staged)
Start by inventorying every sender. Microsoft 365 or Google Workspace, ticketing systems, marketing platforms, invoicing tools, HR systems, monitoring alerts, and any other service that sends mail from your domain. Most organizations discover senders they forgot about during this step. This inventory becomes the foundation for SPF and DKIM configuration.
Publish a clean SPF record and keep it maintainable. Avoid uncontrolled include sprawl. Enable DKIM signing for major systems and vendors where supported. Set DMARC to p=none with aggregate reports routed to a tool you can actually use, not a mailbox nobody reads. Review the reports for 30 to 60 days to identify all legitimate senders and fix failures.
Tighten gradually. Move to p=quarantine when you're confident all major senders are covered, then to p=reject when the failure rate is consistently low. Add MTA-STS and TLS-RPT if your industry or risk profile warrants transport-layer protection. The staged approach prevents the most common mistake: breaking legitimate mail by enforcing too early.
How N2CON approaches it
We take an operational-first approach. We start with your real senders and business workflows rather than a generic policy target. DMARC reporting is noisy without tooling, so we implement monitoring with an owner and a review cadence so the reports actually get used. We pair email authentication with DNS hygiene, including registrar security, change control, and monitoring.
For clients, we provide DMARC monitoring through a white-labeled portal powered by our PowerDMARC partner. This gives you visibility into authentication results, sender patterns, and policy enforcement without managing the reporting infrastructure yourself. The goal is a system that protects your domain and keeps working as your sender landscape changes over time.
How this connects to other controls
Email authentication connects to several related security areas. Business email compromise is the attack that email authentication directly mitigates. Our Microsoft 365 security basics guide covers the platform-level mail security features that work alongside DNS-based authentication. DNS and registrar security is the foundation: if someone can modify your DNS records, they can disable your email authentication entirely.
MFA protects the accounts that manage your email and DNS configuration. If an admin account is compromised, the attacker can change SPF, DKIM, and DMARC records to enable spoofing. These controls work as layers: email authentication makes spoofing harder, DNS security prevents authentication bypass, and MFA protects the accounts that control both.
Common Questions
What is DMARC and how does it prevent spoofing?
DMARC (Domain-based Message Authentication, Reporting & Conformance) ties SPF and DKIM results to the visible "From" domain, publishes a policy telling receivers what to do with unauthenticated mail, and provides reporting so you can see who's sending mail "as you."
What is the difference between SPF, DKIM, and DMARC?
SPF publishes which servers are authorized to send mail for your domain. DKIM cryptographically signs messages so receivers can validate authenticity. DMARC ties SPF/DKIM to the visible sender domain, enforces policy (none/quarantine/reject), and provides reporting on authentication results.
Why is my DMARC stuck at p=none?
Moving from p=none (monitor only) to quarantine or reject requires validating all legitimate senders first. Unknown marketing tools, CRMs, invoicing platforms, and other third-party senders often break DKIM/SPF. Use DMARC reports to identify and fix all senders before enforcing.
What is MTA-STS and do I need it?
MTA-STS (SMTP TLS Reporting) helps prevent STARTTLS downgrade attacks by publishing a policy requiring encrypted TLS connections to your mail servers. It's especially important for organizations handling sensitive communications or operating in regulated industries.
Should we use subdomains for third-party email senders?
Using purpose-built subdomains (e.g., mail.example.com, billing.example.com) for third-party sending can contain reputation damage and simplify governance. Issues with one vendor are isolated to that subdomain rather than affecting your primary domain reputation.
Related resources
Sources & References
Want spoofing protection without breaking email delivery?
We can implement SPF/DKIM/DMARC and ongoing monitoring via a white-labeled portal powered by our PowerDMARC partner.
Contact N2CON