SPF, DKIM, DMARC: A Real-World Setup Guide

If your domain can be spoofed, attackers can impersonate your team in minutes. SPF, DKIM, and DMARC are still the fastest way to reduce phishing risk — if configured correctly.

What each control actually does

Minimum viable setup

  1. Publish SPF with all legitimate senders (Google, Microsoft, newsletter tools, etc.)
  2. Enable DKIM signing for each platform that sends as your domain
  3. Start DMARC at p=none for visibility, then move to quarantine and reject
v=DMARC1; p=none; rua=mailto:[email protected]; fo=1; adkim=s; aspf=s

Common mistakes that break delivery

Rollout path that avoids drama

  1. Week 1: DMARC p=none, collect reports
  2. Week 2: fix unknown senders and alignment failures
  3. Week 3: move to p=quarantine
  4. Week 4+: move to p=reject when pass rate is stable

Need help validating your setup?

Run EdgeIQ email header analysis to spot SPF/DKIM/DMARC gaps before attackers abuse your domain.

Run a check →