Back to Learn
security
March 2026

What are email authentication best practices in 2026?

Use SPF with -all, DKIM with 2048-bit keys, DMARC with p=reject, enable MTA-STS, consider BIMI, and monitor with automated scanning.

Detailed Answer

Complete email authentication checklist for 2026, based on current requirements from Google, Yahoo, Microsoft, and industry standards.

Essential (must-have):

  1. SPF: Use -all (hardfail), keep under 10 lookups
  2. DKIM: 2048-bit RSA key minimum, rotate annually
  3. DMARC: p=reject with rua reporting enabled
  4. Reverse DNS: PTR records for all sending IPs
  5. TLS: Require TLS 1.2+ for SMTP connections
  6. Valid certificates: No expired or self-signed certs on mail servers

Recommended (should-have): 7. MTA-STS: Enforce TLS with published policy 8. TLS-RPT: Receive TLS failure reports via _smtp._tls TXT record 9. BIMI: Display brand logo in email clients 10. DANE/TLSA: If DNSSEC is available for your TLD 11. ARC: For mailing lists and forwarding services 12. List-Unsubscribe: One-click unsubscribe header for marketing emails

Monitoring: 13. Automated scanning: Regular checks with tools like IntoDNS.ai 14. DMARC reports: Analyze aggregate and forensic reports 15. Blacklist monitoring: Check IPs against blocklists daily 16. Certificate monitoring: Alert on upcoming expiry

Common mistakes to avoid:

  • Using ~all instead of -all in SPF (softfail is weaker)
  • Using 1024-bit DKIM keys (upgrade to 2048-bit)
  • Leaving DMARC at p=none permanently (monitor then enforce)
  • Not including all sending services in SPF
  • Forgetting to authenticate transactional email
  • Not monitoring DMARC reports

Score your domain: Scan at https://intodns.ai for a grade (A+ to F) covering all these best practices.

Learn more:

  • SPF guide: https://intodns.ai/learn/spf
  • DKIM guide: https://intodns.ai/learn/dkim
  • DMARC guide: https://intodns.ai/learn/dmarc

Check your domain now

Use IntoDNS.ai to scan your domain and get instant security insights.

Scan Your Domain