Learn

Reference primers and step-by-step playbooks for email authentication, lookalike-domain protection, and takedowns. Every page PhishFence operators need, in one place.

Reference DMARC RFC 7489

DMARC

DMARC tells receiving mail servers what to do when an inbound message claims to be from your domain but fails SPF and DKIM authentication checks.

Read
Reference SPF RFC 7208

SPF

SPF lists which servers are authorised to send email on behalf of your domain. Receivers check the inbound IP against your SPF record and accept or flag the message accordingly.

Read
Reference DKIM RFC 6376

DKIM

DKIM cryptographically signs every outbound message with a private key; receivers verify the signature against your public key in DNS. Survives forwarding, unlike SPF.

Read
Reference Email transport RFC 8617

ARC

ARC lets a forwarder vouch for the authentication state of a message it received, so the next hop can trust the upstream verdict even when SPF and DKIM are broken by forwarding.

Read
Reference BIMI draft-blank

BIMI

BIMI lets receivers display your brand logo next to authenticated messages in the inbox. Requires DMARC at p=quarantine or p=reject.

Read
Reference Email transport RFC 8461

MTA-STS

MTA-STS forces sending servers to use TLS when delivering mail to your domain, blocking downgrade attacks that would otherwise let an attacker intercept inbound mail in plaintext.

Read
Reference Email transport RFC 8460

TLS-RPT

TLS-RPT asks sending servers to send you daily aggregate reports of every TLS failure they hit when delivering mail to your domain. The visibility complement to MTA-STS.

Read
Reference Email transport RFC 6698

DANE

DANE pins a hash of your TLS certificate in DNS via TLSA records. Receivers can then validate the cert without trusting public Certificate Authorities. The DNSSEC chain is the trust anchor.

Read
Reference Email transport RFC 5965

ARF

ARF is the standardised email format mailbox providers use to report abuse and authentication failures back to senders. The structured payload that powers DMARC's ruf= reports.

Read
Reference Email transport RFC 4033

DNSSEC

DNSSEC adds cryptographic signatures to DNS responses so resolvers can verify the data wasn't tampered with in transit. Foundation for DANE, MTA-STS, and trust in DNS-published security policies.

Read
Reference DMARC

DMARC alignment

Alignment is the rule that decides whether an SPF or DKIM pass actually counts as a DMARC pass. Most domains that get spoofed have SPF and DKIM working but mis-configured alignment.

Read
Reference Email transport

TLS-RPT vs MTA-STS

MTA-STS enforces TLS on inbound mail to your domain. TLS-RPT tells you when TLS fails. They solve different halves of the same problem and you publish both, but the deployment order matters.

Read
Reference BIMI

BIMI prerequisites

BIMI displays your brand logo next to your email in supporting inboxes (Gmail, Apple Mail, Yahoo, AOL). It only works if your domain is at DMARC enforcement AND your logo is a properly-formatted SVG Tiny PS. And for Gmail / Apple Mail, you also need a Verified Mark Certificate (VMC).

Read
Reference DMARC

Common XML report errors

Most DMARC aggregate reports parse cleanly, but a handful of receiver-specific quirks trip up parsers. This is what each error usually means and whether it's safe to skip.

Read
How-to DMARC

Ramp to p=reject

Going from p=none to p=reject in one step will bounce real customer mail. The right ramp is observe, fix gaps, escalate gradually. Typically 6-12 weeks for a domain with multiple senders.

Read
How-to DMARC Microsoft 365

Microsoft 365 gotchas

Microsoft 365 DMARC setup is mostly mechanical, but four specific behaviours trip up almost every tenant: SPF include depth, custom-domain DKIM, the legacy MX rewriting, and Exchange Online's group-message handling.

Read
How-to DMARC Google Workspace

Google Workspace gotchas

Google Workspace DKIM is opt-in per domain. Until you turn it on, every message signs only with google.com. Which never aligns with your From. Most other gotchas come from the SPF include and from Groups.

Read
How-to DMARC SendGrid

SendGrid gotchas

SendGrid sends from sendgrid.net IPs by default and signs with d=sendgrid.net. Neither aligns with your From. You need to set up Domain Authentication so SendGrid signs with d=yourdomain via CNAME-delegated DKIM.

Read
How-to DMARC Mailchimp

Mailchimp gotchas

Mailchimp's DKIM setup is CNAME-only. You publish two CNAMEs at k1._domainkey and k2._domainkey and Mailchimp signs with d=yourdomain. SPF is NOT required if DKIM aligns; in fact Mailchimp's docs recommend skipping the SPF include.

Read
How-to DMARC Postmark

Postmark gotchas

Postmark gives you DKIM CNAME delegation and a Return-Path CNAME so both DKIM and envelope-from align with your domain. It's one of the cleanest ESP setups. Most issues come from the optional SPF step.

Read
How-to DMARC Resend

Resend gotchas

Resend uses a per-domain MX + TXT + DKIM CNAME pattern under a sending subdomain (default: send.yourdomain). Both SPF and DKIM must be set up for DMARC to align cleanly.

Read
How-to DMARC

DMARC, SPF, DKIM setup

Walkthrough for publishing DMARC, SPF, and DKIM on a domain. Covers record syntax, common ESP setups, and verification.

Read
How-to DMARC

DMARC rollout playbook

How to safely move from p=none to p=reject without breaking real mail. The 6-12 week ramp every domain should follow.

Read
How-to Takedown

Report registrar abuse

Find the right abuse contact, write a takedown report registrars will act on, and escalate if they don't.

Read
How-to Takedown

Report a phishing site

Filing with Google Safe Browsing, Microsoft SmartScreen, Cloudflare, hosting providers, and CDNs to get a phishing site offline fast.

Read
How-to Takedown

UDRP complaint

When abuse reports fail, UDRP is the trademark-based path to transfer a malicious domain to you. The full filing walkthrough.

Read
How-to Brand protection

Defensive registration

Which lookalike domains are worth registering yourself, which to monitor, and the budget every brand needs for proactive coverage.

Read
Reference Concepts

Confidence levels

What each alert confidence band (registered, suspected, likely, confirmed) means, what signals drive it, and how to triage.

Read
Reference Brand protection

Typosquatting: The Cheapest Attack That Still Works

Attackers register domains that look almost identical to yours, then use them to steal credentials from your customers. It takes less than a minute to set up, and most businesses never find out until the damage is done.

Read
Reference Brand protection

Using Certificate Transparency Logs to Catch Phishing Early

Every SSL certificate issued is recorded in a public ledger. If you know where to look, you can detect phishing infrastructure before it goes live.

Read
Reference Concepts

How to Tell a Real Phishing Threat From a Harmless Lookalike

A registered lookalike domain is not the same as an active phishing site. Understanding the signals that separate real threats from noise is critical to an effective response.

Read
Reference Concepts

How DNS Works and How Attackers Use It Against You

DNS is the system that translates domain names into addresses your computer can find. It is also one of the most exploited layers in phishing attacks. This article explains both, starting with the basics.

Read
How-to DKIM

How to Check if an Email Is DKIM Signed (and Why It Matters)

DKIM is one of the three pillars of email authentication, but most people have never opened a raw email to verify a signature. Here is exactly how to check, what the result actually means, and how phishers exploit the gaps.

Read
How-to Brand protection

How to Stop Typosquatting Domains Targeting Your Brand

There is no magic button that makes typosquats disappear. What exists is a repeatable workflow: detect early, evaluate fast, file abuse reports, and, when the domain matters, register it yourself. Here is how to run that loop in practice.

Read
How-to Takedown

UDRP Complaint Filing: A Practical Guide for Brand Owners

UDRP is the domain-dispute process that recovers a cybersquatted domain without going to court. It is slower and more expensive than an abuse report, but it is the right tool when a registrar will not act and the squatter will not sell or remove.

Read
Reference Brand protection

Lookalike Domain Monitoring: What to Look For in a Service

Domain monitoring services range from free CLI tools to $20K/year enterprise platforms. The features that actually matter are detection coverage, signal quality, takedown workflow, and whether the alerts will wake you up for real threats without crying wolf.

Read
How-to Compliance

NIS 2 Email Security: A Compliance Playbook

NIS 2 Article 21 mandates technical measures for secure electronic communications. Here is exactly which email-security controls map to which clauses, what evidence auditors look for, and how to produce it.

Read
How-to Compliance

DORA Phishing Protection: A Technical Playbook for Financial Entities

The Digital Operational Resilience Act (DORA) expects financial entities to detect and respond to impersonation and phishing attacks. Here is how to map that expectation to a concrete control program.

Read
How-to SPF

Fixing 'SPF PermError: Too Many DNS Lookups'

RFC 7208 caps SPF evaluation at 10 DNS lookups. Hit that limit and DMARC fails on the SPF side for every recipient. Here's how the cap actually counts and the two-line fix.

Read
Reference Brand protection

Typosquatting vs. Combosquatting: Two Attacker Patterns You Need to Know

Typosquatting tricks people who misspell URLs. Combosquatting tricks people who think the URL looks legitimate. The detection logic for each is different. Here's how attackers use both and how monitoring catches them.

Read
How-to Compliance

The SMB Domain Security Checklist: 5 Things to Do This Week

Domain security advice usually targets enterprises with full security teams. Here's the pragmatic version for small-to-mid-sized businesses: five things you can do this week, in order, that close 80% of the risk.

Read

Email-auth and DNS-security FAQ

Short definitions of the protocols people search for the most. Each links to the full explainer.

What is DMARC?
DMARC (Domain-based Message Authentication, Reporting & Conformance, RFC 7489) is a DNS-published policy that tells receiving mail servers what to do when a message claiming to be from your domain fails SPF and DKIM, and asks receivers to send daily aggregate reports of every IP that sent as your domain. Read more →
What is SPF?
SPF (Sender Policy Framework, RFC 7208) is a DNS TXT record that lists which servers are authorised to send email on behalf of your domain. It is hard-capped at 10 DNS lookups per evaluation and does not survive forwarding. Read more →
What is DKIM?
DKIM (DomainKeys Identified Mail, RFC 6376) cryptographically signs every outbound message with a private key; receivers verify the signature against your public key published in DNS. DKIM survives forwarding, which is why DMARC alignment relies on it for forwarded mail. Read more →
What is BIMI?
BIMI (Brand Indicators for Message Identification) is a DNS TXT record that lets supporting receivers display your brand logo next to authenticated messages in the inbox. It requires DMARC at p=quarantine or p=reject and, for Gmail/Apple Mail, a Verified Mark Certificate. Read more →
What is MTA-STS?
MTA-STS (RFC 8461) forces sending servers to use TLS when delivering mail to your domain by publishing a DNS TXT record plus an HTTPS-fetched policy file at mta-sts.yourdomain. In enforce mode, non-TLS delivery is bounced rather than sent in cleartext. Read more →
What is TLS-RPT?
TLS-RPT (RFC 8460) is a DNS TXT record at _smtp._tls.yourdomain that asks sending servers to send you daily aggregate reports of every TLS failure they hit when delivering mail to you. It is the visibility complement to MTA-STS. Read more →

Ready to put these into practice?

PhishFence implements all of these protocols for monitored domains: continuous DMARC reporting, SPF + DKIM auditing, MTA-STS enforcement guidance, BIMI checks, and lookalike-domain monitoring on top.

Start free