Check SPF, DKIM, DMARC, BIMI, MX, MTA-STS and TLS-RPT — and generate a readable report.
Use the domain you send mail from (RFC5322.From). If you send from a subdomain (e.g. alerts.example.com), enter that exact subdomain.
DKIM DNS name format: <selector>._domainkey.<domain>. If blank, we try common selectors.
v=spf1 include:spf.protection.outlook.com -all
v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com; adkim=s; aspf=s; pct=100
Start with p=none or quarantine before moving to reject.
version: STSv1 mode: enforce mx: *.mail.protection.outlook.com max_age: 604800
v=TLSRPTv1; rua=mailto:tlsrpt@yourdomain.com
| Control | Type | Name / Host | Value (example / template) | TTL | Notes |
|---|
DNS alone is not enough. You must host this file at: https://mta-sts.example.com/.well-known/mta-sts.txt
Requirements: valid public TLS certificate, reachable without auth, correct hostname mta-sts.<domain>.
version: STSv1 mode: enforce mx: mail.example.com max_age: 604800
Replace mx: lines to match your real MX hostnames (often your mail gateway). Use mode: testing first if you want a safer rollout.
Includes a strictness score based on common best practices.
DNS is queried using DoH (Cloudflare) from your browser. MTA-STS/BIMI URLs are fetched via HTTPS.