Email
authentication,
explained.
What is DMARC?
Begin here. Learn how DMARC protects your domain from email spoofing and phishing attacks with policy-based authentication.
Core concepts
The foundational protocols every domain owner should understand — what they do, how they fit together, and where they come up short.
- IICore concept5 min readRev. Apr 23, 2026
What is SPF?
Understand Sender Policy Framework (SPF) and how it authorizes mail servers to send email on behalf of your domain.
- IIICore concept5 min readRev. Apr 23, 2026
What is DKIM?
Learn how DomainKeys Identified Mail (DKIM) uses cryptographic signatures to verify email authenticity.
- IVCore concept5 min readRev. Apr 23, 2026
DMARC Aggregate Reports Explained
Understand DMARC aggregate (RUA) reports — what they contain, how to read them, and why they matter for email security.
- VCore concept5 min readRev. Apr 23, 2026
DMARC Forensic Reports Explained
Learn about DMARC forensic (RUF) reports — detailed failure reports that help investigate individual authentication failures.
- VICore concept5 min readRev. Apr 23, 2026
DMARC Alignment Explained
Understand DMARC alignment — how SPF and DKIM domain alignment determines whether emails pass DMARC checks.
- VIICore concept5 min readRev. Apr 23, 2026
What is BIMI?
Learn how Brand Indicators for Message Identification (BIMI) displays your brand logo in email inboxes.
- VIIICore concept5 min readRev. Apr 23, 2026
What is TLS-RPT?
Understand TLS Reporting (TLS-RPT) and how it monitors the security of email transport encryption.
- IXCore concept5 min readRev. Apr 23, 2026
What is ARC?
Learn how Authenticated Received Chain (ARC) preserves email authentication results across forwarding hops.
- XCore concept5 min readRev. Apr 23, 2026
What is MTA-STS?
Understand MTA Strict Transport Security (MTA-STS) and how it enforces TLS encryption for inbound email.
Comparisons
Side-by-side breakdowns — when each protocol matters, how they differ, and which one you actually need to deploy first.
- 01Comparison4 min readRev. Apr 23, 2026
DMARC p=none vs p=reject: Which Policy Should You Use?
Compare DMARC policy options — understand when to use p=none for monitoring and when to enforce p=reject for protection.
- 02Comparison4 min readRev. Apr 23, 2026
SPF vs DKIM: What's the Difference?
Understand the key differences between SPF and DKIM, and why you need both for complete email authentication.
- 03Comparison4 min readRev. Apr 23, 2026
DMARC vs SPF: How They Work Together
Learn the difference between DMARC and SPF, and why DMARC builds on SPF to provide policy enforcement and reporting.
- 04Comparison4 min readRev. Apr 23, 2026
DMARC Aggregate vs Forensic Reports
Compare DMARC aggregate (RUA) and forensic (RUF) reports — understand what each provides and when to use them.
- 05Comparison4 min readRev. Apr 23, 2026
BIMI vs No BIMI: Is It Worth Implementing?
Evaluate the benefits of implementing BIMI for your domain — brand visibility, trust, and deliverability improvements.