Technical7 min read30 April 2026

DNS Security for UK Businesses: SPF, DMARC, and DKIM Explained

Email spoofing costs UK businesses millions each year. SPF, DMARC, and DKIM are the three DNS records that stop attackers from impersonating your domain. Here's how to set them up.

The Email Spoofing Problem

Email spoofing — sending emails that appear to come from your domain without your authorisation — is one of the most damaging and underappreciated threats facing UK businesses. Attackers use spoofed emails for:

  • Business Email Compromise (BEC): Impersonating a CEO or finance director to authorise fraudulent bank transfers. UK Finance reported that BEC fraud cost UK businesses over £137 million in 2023.
  • Phishing campaigns: Sending convincing phishing emails that appear to come from your brand to your customers.
  • Spam: Using your domain's reputation to send bulk unsolicited email, damaging your deliverability.

The solution lies in three DNS records that together form an email authentication framework: SPF, DKIM, and DMARC.

SPF: Sender Policy Framework

SPF is a DNS TXT record that lists the IP addresses and mail servers authorised to send email on behalf of your domain. When a receiving mail server gets an email claiming to be from your domain, it checks your SPF record to verify the sending server is on the approved list.

Example SPF Record

v=spf1 include:_spf.google.com include:sendgrid.net ip4:203.0.113.1 -all

This record says: "Email from this domain may come from Google Workspace, SendGrid, or the IP 203.0.113.1. Reject everything else."

The -all at the end is critical — it tells receiving servers to reject (hard fail) emails from unauthorised sources. Using ~all (soft fail) only marks them as suspicious, which many spam filters ignore.

SPF Limitations

SPF only validates the envelope sender (the technical MAIL FROM address), not the From header that users see in their email client. This is why SPF alone is insufficient — you need DKIM and DMARC too.

DKIM: DomainKeys Identified Mail

DKIM adds a cryptographic signature to outgoing emails. Your mail server signs each email with a private key; the corresponding public key is published in your DNS. Receiving servers verify the signature, confirming the email has not been tampered with in transit and genuinely originated from your infrastructure.

How to Set Up DKIM

  1. Generate a DKIM key pair in your email platform (Google Workspace, Microsoft 365, Mailchimp, etc.)
  2. Publish the public key as a DNS TXT record at selector._domainkey.yourdomain.com
  3. Enable DKIM signing in your email platform settings_

Most modern email platforms generate the DNS record for you — you just need to add it to your DNS provider.

DMARC: Domain-based Message Authentication, Reporting and Conformance

DMARC ties SPF and DKIM together and adds a policy layer. It tells receiving servers what to do when an email fails authentication checks, and provides reporting so you can see who is sending email on behalf of your domain.

DMARC Policies

PolicyEffectWhen to Use
p=noneMonitor only — no action takenStarting out, collecting data
p=quarantineFailed emails go to spam folderTransitioning to enforcement
p=rejectFailed emails are rejected outrightFull enforcement — the goal

Example DMARC Record

v=DMARC1; p=reject; rua=mailto:[email protected]; ruf=mailto:[email protected]; pct=100

The rua tag specifies where aggregate reports are sent (daily summaries of authentication results). These reports are invaluable for identifying legitimate email sources you may have missed in your SPF record.

The Recommended Rollout Process

  1. Start with p=none and collect reports for 2-4 weeks
  2. Review reports to identify all legitimate sending sources
  3. Ensure all legitimate sources pass SPF or DKIM
  4. Move to p=quarantine with pct=10 (applies to 10% of failing mail)
  5. Gradually increase pct to 100
  6. Move to p=reject

Google and Yahoo's 2024 Requirements

In February 2024, Google and Yahoo began requiring bulk senders (those sending more than 5,000 emails per day to Gmail/Yahoo addresses) to have SPF, DKIM, and DMARC configured. Emails that do not comply are rejected or sent to spam. Even if you send fewer than 5,000 emails per day, these requirements signal the direction of travel — DMARC enforcement is becoming the industry standard.

Checking Your DNS Security with WebGuard

WebGuard checks for the presence and correct configuration of SPF, DKIM, and DMARC records as part of every scan. The report shows whether each record exists, whether the policy is in enforcement mode (-all for SPF, p=reject for DMARC), and common misconfigurations (too many DNS lookups in SPF, missing DKIM selector, DMARC in monitor-only mode).

Run a free scan [blocked] to check your domain's email authentication configuration today.

Share this article

Check Your Website Now

Free scan, no account required. See exactly which issues affect your site.

Start Free Scan