BounceCheckBounceCheck
    • Features
      Bulk Email Verification
      Verify thousands of emails at once
    • Tools
      Disposable Email Checker
      Detect throwaway email domains
      Email Extractor
      Extract emails from any text or file
    • Pricing
    • Compare
    • Blog
    • About
    Sign inStart Free
    Back to The Field Guide
    § Email Deliverability

    SPF, DKIM, DMARC Explained for Marketers (2026 Setup Guide)

    B
    BounceCheck Team
    May 8, 2026
    5 min read
    SPF DKIM DMARC email authentication records explained

    TL;DR

    If you send marketing email at any volume, you need all three authentication protocols configured — not one, not two. SPF says which servers can send for your domain. DKIM signs each message so it can't be tampered with. DMARC ties them together and tells inboxes what to do when something fails.

    Since February 2024, Gmail, Yahoo, and Apple require SPF, DKIM, and DMARC for any sender pushing more than 5,000 emails per day to their inboxes. Skip them and your campaigns land in spam — or never get delivered at all. The good news: setup takes a few DNS records and a couple of hours, and senders who reach DMARC enforcement (p=quarantine or p=reject) typically see a 5–10% lift in delivery rates on top of the security benefit.

    This guide explains each protocol in marketer language, walks through setup, and shows you how to check whether your current emails are actually passing.

    Why marketers care about email authentication

    Email authentication isn't an IT-only checkbox anymore — it directly controls how many of your campaigns reach the inbox.

    • Phishing volume is at record levels. Roughly 3.4 billion phishing emails are sent per day, and the FBI now classifies Business Email Compromise as a $55 billion problem. Inbox providers responded by tightening the rules on every sender, not just the bad actors.
    • The big four mailbox providers — Gmail, Yahoo, Microsoft, Apple — now require SPF, DKIM, and DMARC for bulk senders. No authentication, no inbox.
    • Authenticated mail gets better placement. ISPs treat your DMARC posture as a reputation signal, on par with your bounce rate and complaint rate.
    • Spoofing damages your brand. If attackers send phishing emails using your domain, your customers stop trusting your real campaigns — even after you fix the leak.

    For a marketer, the practical translation: authentication is the price of admission, and it's also one of the few deliverability levers you can pull once and benefit from forever.

    SPF, DKIM, DMARC at a glance

    Protocol What it answers What it checks What happens if it fails alone
    SPF Where did this email come from? Sending server's IP against your DNS allow-list Mail may still deliver — SPF on its own carries no enforcement
    DKIM Was the message tampered with? Cryptographic signature against your published public key Same — DKIM is a trust signal, not a policy
    DMARC Who claims to have sent it, and what should the inbox do if SPF/DKIM fail? Alignment between SPF/DKIM and the visible "From" domain The policy you set runs: none, quarantine, or reject

    Memorize the three-word version: SPF = where. DKIM = what. DMARC = who + what to do.

    What is SPF?

    SPF (Sender Policy Framework) is a TXT record in your domain's DNS that lists every server allowed to send mail for you. When an inbox receives a message claiming to be from yourbrand.com, it pulls your SPF record and checks whether the sending server's IP is on the list.

    If you use Google Workspace, Mailchimp, and Zendesk, all three need to appear in your SPF record — otherwise legitimate sends from those tools fail authentication and end up in spam.

    Marketer takeaway: SPF is your "who is allowed to send" list. Every time you add a new ESP, support tool, or transactional service, the SPF record needs updating.

    SPF strengths

    • Easy to publish initially
    • Stops attackers from spoofing your domain at the server level
    • Universally supported by inbox providers

    SPF weaknesses

    • Only checks the technical "Return-Path" address — not the visible "From" your subscriber actually sees
    • Limited to 10 DNS lookups per check; exceed that and SPF fails silently
    • Breaks any time a third-party sender rotates IP addresses

    Sample SPF record

    v=spf1 include:_spf.google.com include:mail.zendesk.com include:spf.mandrillapp.com ~all
    

    The ~all at the end is a soft-fail — anything not listed is suspicious but not auto-rejected. For most marketing programs, soft-fail is the right setting until you've confirmed every legitimate sender is included.

    What is DKIM?

    DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email's header. The signature is created with a private key on your sending server; the inbox verifies it using a public key you publish in DNS.

    If anything in the message body or critical headers changes between send and receipt, the signature breaks — and the inbox knows the message was tampered with.

    Marketer takeaway: DKIM is the tamper-evident seal on each message. It's also what unlocks BIMI (your logo next to the sender name in Gmail) once DMARC is at enforcement.

    DKIM strengths

    • Verifies the message hasn't been altered in transit
    • Builds long-term sender reputation with mailbox providers
    • Required for BIMI logo display

    DKIM weaknesses

    • Key rotation and management is non-trivial
    • Can break in forwarding scenarios (mailing lists, "send to a friend" features)
    • On its own, says nothing about what an inbox should do with a failed message

    How DKIM gets enabled

    Modern ESPs — Brevo, Mailchimp, Klaviyo, HubSpot, Salesforce Marketing Cloud — generate the DKIM key pair for you and tell you exactly which TXT record to publish under your domain (typically at selector._domainkey.yourdomain.com). It's a copy-paste job, not a cryptography exercise.

    What is DMARC?

    DMARC (Domain-based Message Authentication, Reporting & Conformance) is the protocol that ties SPF and DKIM together and finally gives you policy and visibility.

    Without DMARC, an attacker can pass SPF (using a different domain in the Return-Path) while spoofing your brand in the visible "From" line. DMARC closes that gap by requiring alignment — the domain in From has to match the domain that passed SPF or DKIM.

    DMARC also gives you something the other two don't: reports. Mailbox providers send daily aggregate reports to the address you specify, telling you exactly who is sending mail claiming to be you, what's authenticating, and what's failing.

    The three DMARC policies

    • p=none — monitor only. Receives reports but takes no action on failures. Use this for the first 2–4 weeks while you discover all your legitimate senders.
    • p=quarantine — failed messages go to spam.
    • p=reject — failed messages are dropped at the gateway and never delivered.

    The hard truth about DMARC: according to Valimail's research, 75% to 80% of domains that publish a DMARC record never make it past p=none. They're getting reports but no protection — and no deliverability boost. Operating at p=none indefinitely is the email-authentication equivalent of installing a security camera with no recording.

    Senders that do reach enforcement see real numbers: 5% to 10% improvement in marketing delivery rates is a commonly observed lift, on top of the brand-protection benefit.

    Sample DMARC record (monitor mode)

    v=DMARC1; p=none; rua=mailto:[email protected]; pct=100
    

    Once you've reviewed reports for a few weeks and confirmed every legitimate sender is authenticating cleanly, ramp up: p=quarantine; pct=25 → p=quarantine; pct=100 → p=reject.

    How SPF, DKIM, and DMARC work together

    The point of using all three isn't redundancy — it's coverage. Here's the sequence when one of your marketing emails arrives at a Gmail inbox:

    1. The recipient's mail server checks for a DMARC record on your sending domain.
    2. It runs the SPF check — does the sending IP match your published list?
    3. It runs the DKIM check — does the cryptographic signature verify against your published public key?
    4. It checks alignment — does the domain in the visible "From" match the SPF or DKIM domain?
    5. If anything fails, the DMARC policy you published kicks in — none, quarantine, or reject.
    6. An aggregate report is sent back to you with the result, regardless of pass or fail.

    If any one of the three is missing — say you have SPF and DKIM but no DMARC — attackers can still spoof your visible "From" address and there's no policy telling the inbox to reject it.

    Setup walkthrough — what to actually do this week

    You need access to your domain's DNS provider (Cloudflare, GoDaddy, Route 53, etc.) and a list of every service that sends email on your behalf.

    1. Inventory your senders

    Before touching DNS, list every tool that emails from your domain:

    • Marketing ESP (Mailchimp, Klaviyo, HubSpot, Brevo, etc.)
    • Transactional service (SendGrid, Postmark, Amazon SES)
    • CRM (Salesforce, HubSpot)
    • Support / helpdesk (Zendesk, Intercom, Front)
    • Internal mail (Google Workspace, Microsoft 365)
    • Any custom application sending from your domain

    Miss one and its emails will start failing once you tighten your DMARC policy.

    2. Publish SPF

    Combine the SPF includes from each service into a single TXT record. Example for Google Workspace + Klaviyo + Zendesk:

    v=spf1 include:_spf.google.com include:_spf.klaviyo.com include:mail.zendesk.com ~all
    

    Watch the 10-lookup limit. Each include: typically counts as one lookup, and large ESPs sometimes nest their own includes. If you're at the limit, remove unused services rather than chaining a flattening service that goes stale.

    3. Enable DKIM in every sending platform

    For each tool in your inventory, find the DKIM settings and publish the TXT record they generate. Selectors look like s1._domainkey.yourbrand.com. Each ESP gets its own selector — they don't conflict.

    Send a test email through each service afterward and look at the headers (see "How to check" below) to confirm DKIM is signing.

    4. Publish DMARC in monitor mode

    Start gentle. Add this TXT record at _dmarc.yourbrand.com:

    v=DMARC1; p=none; rua=mailto:[email protected]; pct=100
    

    Set up an inbox or DMARC report parser at the address in rua — the raw XML reports are unreadable, so a parser (free options exist) is essential.

    5. Read reports for 2–4 weeks, fix gaps, then enforce

    The reports will surface every sender claiming to be you, including services you forgot and any legitimate authentication issues. Fix those, then ramp:

    • p=quarantine; pct=25 for a week
    • p=quarantine; pct=100 for a week
    • p=reject once everything's clean

    This is the step 75–80% of senders never finish — and the step that actually protects your brand and lifts your delivery rate.

    How to check whether your existing emails pass

    Send yourself a test email from each platform and inspect the headers.

    Gmail: Click the three dots → Show original Outlook: File → Properties → look in Internet headers Apple Mail: View → Message → All Headers

    Look for the Authentication-Results block:

    Authentication-Results: spf=pass smtp.mailfrom=yourbrand.com;
                            dkim=pass header.d=yourbrand.com;
                            dmarc=pass (p=reject) header.from=yourbrand.com;
    

    Three pass results and your message is fully authenticated. Anything other than pass is a problem worth fixing before your next campaign send.

    Authentication is half the deliverability story

    SPF, DKIM, and DMARC stop spoofing and convince mailbox providers your domain is trustworthy. They don't, however, fix the other half of deliverability: list quality.

    A perfectly authenticated campaign sent to a list full of invalid addresses still produces high bounce rates, which damages the same sender reputation authentication just protected. The two have to move together — clean authentication on a dirty list lifts you a few percent; clean authentication on a clean list is where the real inbox-placement gains live.

    This is why senders who treat list verification as a quarterly habit see better ROI from their authentication work. BounceCheck runs a 30-step verification engine — syntax, MX, SMTP handshake, catch-all, disposable, role-based — and a stealth SMTP layer that checks deliverability without alerting recipients. Pair it with proper DMARC enforcement and you've covered both sides of the inbox-placement equation.

    For more on the list-side of the equation, see the guides on improving email deliverability, sender reputation, and why bounce rates climb.

    Frequently asked questions

    Do I really need all three protocols, or is just SPF and DKIM enough?

    You need all three. SPF and DKIM tell mailbox providers whether a message authenticated; only DMARC tells them what to do when authentication fails. Without DMARC, an attacker can pass SPF (using a different domain in the Return-Path) while still spoofing your brand in the visible "From" line. The big mailbox providers — Gmail, Yahoo, Microsoft, Apple — now require all three for any sender above the bulk threshold.

    What's the bulk-sender threshold I keep hearing about?

    Since February 2024, Gmail (and shortly after, Yahoo and Apple) require SPF, DKIM, and DMARC for senders pushing more than 5,000 messages per day to their inboxes. Microsoft has aligned with similar requirements. Below that threshold the rules are softer, but every serious marketing program is well above 5,000/day.

    Can I set up DMARC without SPF or DKIM?

    For a domain that sends email — no. DMARC requires at least one of SPF or DKIM to pass and align with the From domain. (The exception is "parked" domains that don't send mail at all; those can be locked down with DMARC alone to prevent abuse.)

    Why are most domains stuck at p=none?

    Because reaching enforcement requires fixing every legitimate sender that's failing — and most companies discover during the audit that 5–15 services are sending from their domain that they didn't know about. The work is real, but the deliverability lift (5–10%) and the spoofing protection are worth it.

    Will warming up a new domain replace authentication?

    No — they solve different problems. Domain warm-up builds reputation with mailbox providers over time. Authentication proves to those providers you are who you say you are. You need both, and authentication should be in place from day one of the warm-up.

    How does verification fit alongside SPF/DKIM/DMARC?

    Authentication tells inboxes your domain is trustworthy. Email verification ensures the addresses you're sending to are real and accept mail. Authentication on a list full of invalid addresses still produces bounces, which erodes the reputation authentication just protected. Treat them as two halves of the same job.

    Where can I check if my domain is set up correctly?

    Send yourself a test from each sending platform and check the Authentication-Results header. For ongoing visibility, a DMARC report parser pointed at the rua= address in your DMARC record is the right long-term setup. You can also pair domain checks with our free disposable email checker to spot list-side problems alongside auth-side ones.

    Final thoughts

    Email authentication used to be an optional best practice. It isn't anymore — Gmail and Yahoo made that decision for you in 2024, and the big four mailbox providers all enforce it now. The good news is the work is bounded: a few DNS records, a couple of weeks of DMARC report review, and a careful ramp from p=none to p=reject. The senders who finish that walk pick up a 5–10% delivery lift and shut down brand spoofing in the same move.

    Pair authentication with regular list hygiene and you've covered the two biggest inbox-placement levers a marketer can pull. Start free and run the same 1,000-email sample through BounceCheck before your next campaign — it's a cheaper way to find out where your list stands than learning from a spike in bounce rate after the send.

    B

    BounceCheck Team

    The team behind BounceCheck - helping businesses verify emails and improve deliverability.

    • TL;DR
    • Why marketers care about email authentication
    • SPF, DKIM, DMARC at a glance
    • What is SPF?
    • SPF strengths
    • SPF weaknesses
    • Sample SPF record
    • What is DKIM?
    • DKIM strengths
    • DKIM weaknesses
    • How DKIM gets enabled
    • What is DMARC?
    • The three DMARC policies
    • Sample DMARC record (monitor mode)
    • How SPF, DKIM, and DMARC work together
    • Setup walkthrough — what to actually do this week
    • 1. Inventory your senders
    • 2. Publish SPF
    • 3. Enable DKIM in every sending platform
    • 4. Publish DMARC in monitor mode
    • 5. Read reports for 2–4 weeks, fix gaps, then enforce
    • How to check whether your existing emails pass
    • Authentication is half the deliverability story
    • Frequently asked questions
    • Do I really need all three protocols, or is just SPF and DKIM enough?
    • What's the bulk-sender threshold I keep hearing about?
    • Can I set up DMARC without SPF or DKIM?
    • Why are most domains stuck at p=none?
    • Will warming up a new domain replace authentication?
    • How does verification fit alongside SPF/DKIM/DMARC?
    • Where can I check if my domain is set up correctly?
    • Final thoughts

    More Articles

    Explore guides on email deliverability, verification, and sender reputation.

    Browse All Articles

    § KEEP READING

    You might also like.

    What Is a Transient Email Error? Causes, 4xx Codes, and What to Do
    § Email DeliverabilityMay 19, 2026· 8 min read

    What Is a Transient Email Error? Causes, 4xx Codes, and What to Do

    A plain guide to the transient email error: what it means, the 4xx SMTP code behind it, the common causes, and how it differs from a permanent bounce.

    By BounceCheck TeamRead →
    Email Outreach 101: The 6-Step Framework That Actually Drives Replies
    § Email MarketingMay 18, 2026· 10 min read

    Email Outreach 101: The 6-Step Framework That Actually Drives Replies

    A practical email outreach 101 guide: deliverability setup, list verification, the 30/30/50 copy rule, sequencing, volume caps, KPI targets, and CAN-SPAM compliance.

    By BounceCheck TeamRead →
    LinkedIn Outreach and Email Opening Lines: 10 Examples That Get Replies
    § Email MarketingMay 18, 2026· 9 min read

    LinkedIn Outreach and Email Opening Lines: 10 Examples That Get Replies

    Ten opening line patterns, audience-specific openers, a 10-point self-check, and the deliverability angle that decides whether your LinkedIn or cold email gets read.

    By BounceCheck TeamRead →

    § COLOPHON

    Email verification, made simple. Built for teams who care about clean data and clean code.

    § STATUS

    All systems operational
    BounceCheckBounceCheck

    Real-time email verification with a stealth SMTP engine. Built for deliverability obsessives.

    § PRODUCT

    • Features
    • Bulk Email Verification
    • Single Verify
    • Real-Time API
    • Integrations

    § TOOLS

    • Email Extractor
    • Disposable Email Checker

    § RESOURCES

    • Blog
    • Compare
    • Security
    • Pricing

    § COMPANY

    • About
    • Contact
    • Privacy
    • Terms

    © 2026 BounceCheck — All rights reserved.

    GDPRCCPAENCRYPTEDPRIVATE