PostMTA
Service

Email Authentication
Full Stack Enforcement

Complete deployment and management of your email authentication stack — SPF, DKIM, DMARC, and BIMI. Protect your domain reputation, prevent spoofing, and maximise inbox placement.

Protocols

Complete Authentication Stack

Every protocol deployed and configured to industry best practices. Each layer adds protection and improves deliverability.

Phase 1 — FoundationSPF

Sender Policy Framework

Publish authorised sending IPs for your domain. Prevents forgery and provides ISPs with a clear list of legitimate senders. Essential baseline authentication.

  • Authorised IP list management
  • Include mechanism optimisation
  • SPF macro & redirect handling
  • 10-lookup limit compliance
Phase 1 — FoundationDKIM

DomainKeys Identified Mail

Cryptographic email signing that verifies message integrity and domain association. Each email carries a signature ISPs validate against your DNS records.

  • Key generation & management
  • Selector rotation strategy
  • Canonicalisation setup
  • Subdomain signing policies
Phase 2 — EnforcementDMARC

Domain-Based Message Authentication

Policy framework that tells ISPs how to handle unauthenticated mail. Progress from monitoring to enforcement for maximum protection.

  • Policy creation & management
  • RUA/RUF report aggregation
  • Policy progression (none → quarantine → reject)
  • Forensic report analysis
Phase 3 — AdvancedBIMI

Brand Indicators for Message Identification

Display your brand logo in supporting email clients. Requires DMARC enforcement (p=quarantine or p=reject) and Verified Mark Certificate.

  • Logo preparation & hosting
  • BIMI record creation
  • VMC acquisition support
  • Client compatibility testing
Roadmap

Authentication Compliance Roadmap

A phased approach to full authentication compliance. Move from foundation to advanced protection at your pace.

Phase 11-2 weeks

Foundation

Deploy SPF and DKIM across all sending domains. Establish baselines and verify correct configuration with authentication checking tools.

  • SPF record creation & optimisation
  • DKIM key generation & DNS publication
  • Authentication verification & testing
  • Internal documentation & training
Phase 24-8 weeks

DMARC Enforcement

Implement DMARC with p=none monitoring. Analyse aggregate reports, identify and remediate unauthorised senders, then progress policy.

  • DMARC record creation (p=none)
  • Report analysis & sender identification
  • Remediation of unauthorised sources
  • Policy progression to p=quarantine then p=reject
Phase 32-4 weeks

BIMI & Advanced

Deploy BIMI for brand display in email clients. Implement advanced authentication measures and establish ongoing compliance monitoring.

  • BIMI record deployment
  • VMC application & management
  • Ongoing DMARC report monitoring
  • Quarterly compliance reviews
DMARC Strategy

DMARC Policy Progression

Progress your DMARC policy from monitoring to full enforcement with expert guidance at every step.

p=none
Monitor

No enforcement. Receive aggregate reports to understand all sources of email claiming to be from your domain.

p=quarantine
Quarantine

ISPs send unauthenticated mail to spam. Recommended after identifying and remediating unauthorised senders.

p=reject
Reject

ISPs reject unauthenticated mail outright. Maximum protection for your domain reputation and recipients.

Ready to Secure Your Email Authentication?

Protect your domain reputation and maximise inbox placement with a complete authentication stack deployment.