- What is domain spoofing?Domain spoofing is when a threat actor forges the “From:” address to use your domain name, tricking recipients into trusting a malicious email.
- What is email spoofing?
Email spoofing is the broader tactic of falsifying sender identity. Domain spoofing is one form; others use lookalike domains or display-name tricks.
- How does DMARC stop domain spoofing?DMARC tells receiving mail servers to reject or quarantine messages that fail SPF/DKIM and don’t align with your domain. With p=reject and strict alignment, most forged mail using your domain is blocked.
- Do you store my emails or read my inbox?No. The scanner only queries public DNS records.
- What should my SPF record look like?Keep it simple, include all senders, and end with
-all
. Example:v=spf1 include:_spf.google.com include:sendgrid.net -all
- I got “Easily Spoofable,” but Gmail still blocked a test. Why?Some providers block unauthenticated mail anyway. Your domain posture still needs improving to protect broadly, not just at Gmail.
- Do I need DKIM everywhere?Yes—enable DKIM for Google/Microsoft and any ESP/marketing tool so messages can pass DMARC via DKIM alignment.
- Can I use subdomains for marketing?Yes—publish separate DMARC for subdomains or enforce parent
sp=
policy. We’ll advise the cleanest layout. - How fast can I go from p=none to p=reject?Often 2–4 weeks with proper monitoring and sender inventory. We can accelerate if your sender set is simple.