Email is one of the easiest and most effective ways to reach your customers. But at the same time, it’s also a common target for problems like spam, fake senders, and phishing attacks. To protect against these risks, email providers and internet standards groups created special security checks called email authentication protocols.
These checks help confirm whether an email really comes from the domain (or website address) it claims to be sent from.
The three most common authentication methods are:
When these methods are set up, they make it much harder for fake emails to get through, keep your domain reputation safe, and improve the chances that your messages land in your customer’s inbox instead of the spam folder.
Now we’ll take a closer look at how each one works.
SPF is an email authentication protocol that allows a domain owner to specify which mail servers are authorized to send emails on behalf of their domain.
The domain owner publishes an SPF record in their DNS, listing authorized servers or IP addresses.
To learn more about creating a SPF record, click here.
To learn more about creating a CNAME record, click here.
Example: Grasspods, a company using Vtiger, adds vtiger.com as an authorized sender in its DNS records. When John (a Grasspods user) sends an email, Gmail checks the DNS for grasspods.com and sees that Vtiger is authorized. Gmail then marks the email as Passed SPF.

There is no charge. The changes to the DNS settings, typically performed by your hosting company or network administrator, only require a few minutes.
SPF record example: v=spf1 include:vtigermails.com -al
To authorize Vtiger to send emails on behalf of your domain, you’ll need to update your domain’s DNS settings and add an SPF record. The steps vary depending on your domain hosting provider.

DomainKeys Identified Mail (DKIM) is an email authentication method designed to prove that an email really came from the claimed sender and that it hasn’t been changed along the way. It works by attaching a digital signature to each email. This signature is unique to the sending domain and allows the receiving server to verify the message’s authenticity.
Think of it as a tamper-proof seal for emails. If the seal is intact, the receiver knows the message is genuine and unchanged. If the seal is broken, the system flags it as suspicious.
To learn more about DKIM, click here.
The DKIM process can be broken down into three key steps:
Whatever is selected must remain unchanged during transit—if any of the signed elements are altered, DKIM validation will fail.
Imagine Yahoo forwards an email to Grasspods. If Yahoo modifies the body of the email, for example, by adding a line such as forwarded by Yahoo Mail then the body no longer matches the original hash. If the body were part of the signed elements, the DKIM check would fail.
However, if only the From field (in the header) were included in the DKIM signature, the validation would still pass because the modified body was not part of the signed content.
This flexibility allows domain owners to choose what is most important to protect, while still allowing for legitimate forwarding or minor changes in transit.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that builds on SPF and DKIM.
It allows domain owners to:
A DMARC record is published in your domain’s DNS as a TXT record. It helps receiving servers verify whether an email claiming to come from your domain is legitimate.
By implementing DMARC:
DMARC works in combination with:
If an email fails SPF or DKIM checks, DMARC determines how the receiving server should handle it based on the policy you define.
The receiving server may:
Sample DMARC Record
A DMARC record is added to your DNS as a TXT record. A sample record looks like this:
v=DMARC1; p=none; pct=100; rua=mailto:[email protected]; sp=none; aspf=r;
Tag Explanation
DMARC provides three policy options to define how failed emails should be handled:
Note: The domain owner can request a policy, but the final decision to enforce it is made by the receiving mail server.
Major email providers such as Google and Yahoo require domains to have a DMARC policy configured.
To ensure successful email delivery:
You can configure the DMARC policy for your domain from the Email Settings page under the DMARC Security Authentication section
The CRM checks whether your sending domain has a valid DMARC record configured.
If a DMARC policy exists, the system shows that a policy is configured. If not, the CRM will display the recommended DMARC record (including Host and TXT values) to help you configure it correctly.
You can verify whether DMARC is configured for your domain using an external lookup tool.
Follow these steps to verify:
If no DMARC record is found, you must create one in your DNS. You may begin with a basic monitoring policy, such as:
p=none
Once verified, you can gradually move to stricter policies such as quarantine or reject.