Part 2: Implementing SPF, DKIM, and DMARC to Increase Email Deliverability.
Can I set up DNS Records by myself?
Yes! Although reading about this on the internet is overwhelming and confusing, if this guide is followed, there shouldn’t be any problem setting the DNS records up to work with Microsoft 365. With a little understanding, you can handle this! If the business has an IT department, this is something they should handle. If not, give it a try, changes can always be undone!
What if I mess something up?
A fair warning: it is possible to mess things up and email can stop working, but it’s ok. Just undo the settings, delete the records created, and email will flow again. Call a local trusted tech person if it comes to that because these are needed to ensure email deliverability.
There are also tools that can check these to make sure the syntax is right. Mxtoolbox.com is a great resource. Try using their SuperTool and select SPF, DKIM, DMARC and enter yourdomain.com to view the records and suggestions. I would suggest using that tool before implementing SPF, DKIM, and DMARC, just to make sure these things aren’t implemented already. The tool will even show where DNS is hosted, so there isn’t confusion there. Don’t bother checking DKIM at this point, that will get cleared up later.
What do I need to start setting up DNS Records?
Step 1. Implementing SPF (Sender Policy Framework):
Preface: Depending on the email service used, the values will be defined differently. In this example, yourdomain.com is a Microsoft 365 customer, and ALL email is sent through Microsoft 365. This means they do not use any 3rd party services such as SendGrid or Constant Contacts. If 3rd parties are used, the SPF requirements can be searched online. For example, “SPF record requirements for Microsoft 365” or “SPF record requirements for Gmail”, or a 3rd party service, will return the information needed to append to the SPF record. However, 365 customers can follow this section with ease.
Note: THERE CAN ONLY BE 1 SPF RECORD!
Multiple SPF records will disrupt email, make sure there’s only 1 TXT record that starts with “v=spf”
v=spf1 include:spf.protection.outlook.com -all
v=spf1 include:spf.protection.outlook.com -all
It’s that easy for Microsoft 365 customers!
Now, let’s say there’s a local server at the office which has the ability to send email as yourdomain.com and it doesn’t support relaying off of Microsoft 365 directly. The office IP address needs to be added to this record or else any emails that are sent from that SMTP server will be rejected. If there’s a server like this, a static IP address is also needed for the business, at which point the static IP address can be added to the SPF record as seen in red below:
v=spf1 include:spf.protection.outlook.com ip4:123.456.789.101 -all
Congratulations! At this point, the world knows who is authorized to send email as yourdomain.com and they will not accept email from anyone else trying to spoof yourdomain.com.
Step 2. Implementing DKIM (DomainKeys Identified Mail):
Follow the instructions presented to create the 2 CNAME records needed
Record 1:
Type: CNAME or TXT depending on the instructions
Hostname: selector1._domainkey
Value (use the given values, not this example):
selector1-quick-inc-com._domainkey.quick-inc.com
Record 2:
Type: CNAME or TXT depending on the instructions
Hostname: selector2._domainkey
Value (use the given values, not this example):
Selector2-quick-inc-com._domainkey.quick-inc.com
Note: The MxToolbox verification tool is tricky with DKIM, but if “yourdomain.com:selector1” is entered, hit DKIM Lookup and it will pass. If Microsoft 365 already verified it as working, this step is unnecessary.
Congratulations! DKIM is now enabled!
Step 3. Implementing DMARC (Domain-based Message Authentication, Reporting and Conformance):
Prerequisites: Before beginning, create a shared mailbox called DMARC@yourdomain.com so it can receive reports of DMARC reports and failures. Then grant yourself full access to this mailbox so the reports can be viewed as needed.
Add this record to the registrar/DNS to reject email that fails the checks:
You won’t typically need to review these once it’s all up and running successfully, but this is why I mentioned you should have a shared mailbox created, as you may want to use that shared mailbox in these values.
Congratulations! DMARC is now enabled! You are finished!
References:
*Disclaimer*: Harvard Business Services, Inc. is neither a law firm nor an accounting firm and, even in cases where the author is an attorney, or a tax professional, nothing in this article constitutes legal or tax advice. This article provides general commentary on, and analysis of, the subject addressed. We strongly advise that you consult an attorney or tax professional to receive legal or tax guidance tailored to your specific circumstances. Any action taken or not taken based on this article is at your own risk. If an article cites or provides a link to third-party sources or websites, Harvard Business Services, Inc. is not responsible for and makes no representations regarding such source’s content or accuracy. Opinions expressed in this article do not necessarily reflect those of Harvard Business Services, Inc.