{"id":31489,"date":"2024-11-26T09:56:00","date_gmt":"2024-11-26T09:56:00","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=31489"},"modified":"2025-10-15T08:55:00","modified_gmt":"2025-10-15T08:55:00","slug":"whats-the-difference-between-spf-dkim-and-dmarc","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/","title":{"rendered":"SPF vs. DKIM vs. DMARC: Your Ultimate Guide"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">SPF, DKIM, and DMARC are the three most crucial email authentication protocols to prove to mail servers and ESPs that senders are authorized to send emails on behalf of a specific domain. Implementing these protocols is vital to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevent hackers from spoofing and sending fraudulent emails using your domain name.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your clients, business partners, and organization from cybercriminals attempting to exploit your domain or domain name.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Garner trust among email service providers (ESPs) as a verified sender.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prove to customers, government authorities, and other third parties that your organization takes email security seriously.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhance your email deliverability rates and avoid your messages landing in the spam or junk folders.\u00a0<\/span><\/li>\n<\/ul>\n<p><iframe title=\"DMARC vs. SPF vs. DKIM | What&#039;s The Difference? | EasyDMARC\" width=\"580\" height=\"326\" src=\"https:\/\/www.youtube.com\/embed\/KO7ecn4itq4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/spf-record-syntax-structure-and-components\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Understanding SPF<\/span><\/a><span style=\"font-weight: 400;\">, DKIM, and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/dmarc-the-ultimate-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC protocols<\/span><\/a><span style=\"font-weight: 400;\"> is vital to ensure that your emails are properly authenticated. In February 2024,<\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/google\/google-now-blocks-spoofed-emails-for-better-phishing-protection\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Google and Yahoo<\/span><\/a> <span style=\"font-weight: 400;\">made it compulsory to have email authentication in place, with DMARC policies also becoming mandatory for bulk senders.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article will discuss how SPF, DKIM, and DMARC are used in email authentication and why having all three is a good idea. But before we examine this, let\u2019s explore how email works.<\/span><\/p>\n<h2><b>How Does Email Work?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Email works in this way \u2013 before you can send or read emails from your device, you need a Mail User Agent or MUA, such as Gmail. The MUA interacts with the Mail Transfer Agent or MTA, also known as a mail server. The MTA helps to receive and store your emails remotely. You\u2019ll only receive the mail on your device through the Mail Delivery Agent, or MDA when you open your MUA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Simple Mail Transfer Protocol (SMTP) is a communication protocol responsible for sending emails to a mail server. Even though email providers like Gmail have internal protocols, they still use SMTP to send emails outside their systems. For instance, when a Gmail user wants to send a mail to a Yahoo! mail user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Several protocols, such as POP3 and IMAP, have been designed to help you download emails from the server. Today, both protocols have been replaced by webmail, which allows you to log in and receive mail on any device worldwide. However, you need to be connected to the internet to use it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email protocols weren\u2019t built with security in mind. Mail servers are only tasked with taking messages from the sender and delivering them to the recipient. But this has become an issue as the internet continues to expand, with spamming and phishing growing into prevalent problems for all email users.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At first, email users implemented the TLS (Transport Layer Security) encryption protocol to encode messages in transit. One of the loopholes in TLS is that it doesn\u2019t offer protection for data at rest.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TLS protects data traveling from one MTA to another MTA, but each MTA can modify the message. <a href=\"https:\/\/easydmarc.com\/blog\/dmarc-is-easy\/\">SPF, DKIM, and DMARC<\/a> were created to address this issue and provide a way for mail servers to validate the source of a message.<\/span><\/p>\n<h2><b>What is SPF?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">SPF (Sender Policy Framework) is an email security protocol designed to help detect and prevent email spoofing. The authentication protocol allows you to create a DNS <\/span><span style=\"font-weight: 400;\">TXT <\/span><span style=\"font-weight: 400;\">record in your DNS settings that lists the sender addresses you\u2019ve authorized to send messages on your domain\u2019s behalf. With this protocol, ISPs or email servers can validate that incoming emails from a particular domain are legitimate.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is an example of an SPF Record:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">v=SPF1 ip4:192.168.0.0\/16 include:_spf.google.com ~all<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Your domain administrator can quickly <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-create-an-spf-record\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">create and publish an SPF record<\/span><\/a><span style=\"font-weight: 400;\"> in the DNS record as a TXT entry. Here are some things to include:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The version of SPF you want to use<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The authorized IP addresses allowed to send messages using the domain<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Any third-party domains authorized to send emails on the domain\u2019s behalf<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An ending \u201call\u201d tag indicates the policy that applies when a mail server discovers an unauthorized IP<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When an email message is sent to a recipient claiming to come from your domain or on your domain\u2019s behalf, the receiving mail server will check for an SPF record. If it detects one, it retrieves the list of authorized IPs for the domain. If the sender\u2019s IP matches one from the SPF record, the authentication check is marked as a \u201cPASS,\u201d and the recipient receives the message.\u00a0<\/span><\/p>\n<h2><b>What is DKIM?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DKIM (<\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DomainKeys Identified Mail<\/span><\/a><span style=\"font-weight: 400;\">) is an email authentication method that adds a digital signature to outgoing email messages. It provides email security with a unique identifier using cryptographic signatures instead of IP addresses.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like SPF, DKIM requires a TXT record added to your DNS. DKIM uses encryption to create public and private cryptographic keys. The private key remains on your server and is used to digitally sign every email, while the public key is placed in the DNS.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is an example of a DKIM Public DNS Record:<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-43121 size-full\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM.png\" alt=\"DKIM Public DNS Record\" width=\"2508\" height=\"510\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM.png 2508w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-300x61.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-1024x208.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-768x156.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-1536x312.png 1536w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-2048x416.png 2048w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-1200x244.png 1200w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2024-11-26-at-2.24.04\u202fPM-1980x403.png 1980w\" sizes=\"(max-width: 2508px) 100vw, 2508px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The components of these records are as follows:<\/span><\/p>\n<table style=\"height: 697px;\" width=\"843\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\"><b>DNS Record Type<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;\"><span style=\"font-weight: 400;\">TXT<\/span><\/td>\n<td><span style=\"font-weight: 400;\">A TXT record in DNS is used to store text information. In this context, it&#8217;s used to store the DKIM (DomainKeys Identified Mail) key.<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><b>Name Field<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u201cgoogle\u201d<\/span><\/td>\n<td><span style=\"font-weight: 400;\">This is the DKIM selector name. The selector identifies the specific DKIM key being used. It allows a domain to have multiple DKIM keys for different purposes.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">&#8220;_domainkey&#8221;<\/span><\/td>\n<td><span style=\"font-weight: 400;\">This is a constant suffix in DKIM records that specifies the namespace for the DKIM key. It ensures the correct lookup for the DKIM public key.<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><b>Content Field<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">&#8220;v=DKIM1&#8221;<\/span><\/td>\n<td><span style=\"font-weight: 400;\">This indicates the version of DKIM being used. It is always v=DKIM1 for DKIM records.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">&#8220;k=rsa&#8221;<\/span><\/td>\n<td><span style=\"font-weight: 400;\">This specifies the cryptographic algorithm. In this case, it&#8217;s RSA, the most commonly used algorithm for DKIM.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><span style=\"font-weight: 400;\">&#8220;p&#8221;<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-weight: 400;\">This contains the public key for the DKIM signature. This is a 2048-bit RSA key in the provided record.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">A DKIM signature looks like this:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">DKIM-Signature: v=1; a=rsa-sha256; c=relaxed\/relaxed;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">d=easydmarc.com; s=google;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">h=from: content-transfer-encoding: subject: message-id:date:to:mime-version;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">bh= 1py3bPKPbePCmMziH13AZqw0Fa +\/ wnOTcnp6P-ZLMW2SwMpgo=;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">b= 1yc9n5JU-7bTkT9FxgIYFJutPbxbyfsBXlbD4wJ-Mdt8\/15vjYvI2-<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">IlCipp_FFTkyd3s_yA4jX65vRSsaE2hBhTw okQIHsBTfmTFEEo01BtmUZpR5M4Mtz5Q8LE97YRDE \/nI1hoPWbzDaL9qh<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">When you send an email to a receiver, the recipient server retrieves the DKIM record and uses the public key to decode the <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM signature<\/span><\/a><span style=\"font-weight: 400;\"> and hash it. Then, the receiving server compares the private and public hashes to see if they match. If they match, the receiving server knows the message is authentic, and the email content has not been changed and therefore won\u2019t be considered spam. Otherwise, the message is not from a legitimate sender or has been modified in transit, so it fails DKIM authentication and won\u2019t be delivered to the recipient\u2019s inbox.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM helps to validate three things:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The email content hasn\u2019t been modified or tampered with<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The email headers didn\u2019t change since the sender sent the message<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The domain owner authorizes the email sender.\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/dkim-record-how-to-create-add-and-check-dkim-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Creating your DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> is simple, as most email servers have native DKIM functionality.\u00a0<\/span><\/p>\n<h2><b>What is DMARC?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/glossary\/dmarc\/\">DMARC<\/a> stands for Domain-based Message Authentication, Reporting, and Conformance. This email authentication, policy, and reporting protocol leverages and enhances DKIM and SPF to validate the authenticity of a message using the\u00a0 \u201cfrom\u201d address. This helps prevent email spoofing and phishing attacks and ensures that only legitimate emails are sent from your domain. This authentication protocol has three primary purposes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It validates whether both DKIM and SPF protect an email message. It verifies that the visible \u201cfrom\u201d address matches the domain in the return-path address (for SPF) and the domain specified in the <\/span><span style=\"font-weight: 400;\">d=<\/span><span style=\"font-weight: 400;\"> tag of the DKIM signature. (DKIM d= tag)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It lets the domain owner specify how email receivers should handle unauthenticated messages<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It allows the receiving server to send a report to the sender regarding messages that pass or fail the DMARC authentication checks.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For an email to pass DMARC authentication, it must pass DKIM and\/or SPF. So, if DKIM fails and SPF passes, the message will still be delivered. To implement DMARC, you must <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-create-dmarc-record-in-dns-with-easydmarc\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">create a DMARC record<\/span><\/a><span style=\"font-weight: 400;\"> and define the policy you want based on your needs. The available policies you can deploy include the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Policy = (P=none) \u2013 <\/b><span style=\"font-weight: 400;\">Also called the monitoring policy. No action is taken here, and the message is delivered to the recipient regardless of whether it passes or fails DMARC authentication.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Policy = (P=quarantine) \u2013<\/b><span style=\"font-weight: 400;\"> This policy sends messages failing DMARC authentication to the spam or quarantine folder.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Policy = (P=reject) \u2013<\/b><span style=\"font-weight: 400;\"> The reject policy blocks emails failing DMARC authentication and sends them back. It\u2019s the ultimate policy to strive towards.<\/span><\/li>\n<\/ul>\n<h2><b>Why You Need DMARC vs. SPF vs. DKIM<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Deciding which email authentication protocol to implement can be confusing. Though all three measures are authentication protocols that strengthen your email security, none can stand alone. DMARC, SPF, and DKIM all play a vital role in ensuring your email is protected and delivered as intended. You must implement all three protocols to have complete security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SPF is designed to verify that the sending mail server is authorized to send on behalf of the <\/span><span style=\"font-weight: 400;\">MailFrom:<\/span><span style=\"font-weight: 400;\"> address (Return-Path), but it does not directly validate the visible <\/span><span style=\"font-weight: 400;\">From:<\/span><span style=\"font-weight: 400;\"> address that most users see in their email clients. DKIM ensures that the message has not been altered during transit by verifying a cryptographic signature associated with the domain specified in the <\/span><span style=\"font-weight: 400;\">d=<\/span><span style=\"font-weight: 400;\"> tag, but it does not authenticate the visible <\/span><span style=\"font-weight: 400;\">From:<\/span><span style=\"font-weight: 400;\"> address. DMARC combines these two protocols by requiring that the domain in the visible <\/span><span style=\"font-weight: 400;\">From:<\/span><span style=\"font-weight: 400;\"> address aligns with either the SPF-authenticated <\/span><span style=\"font-weight: 400;\">MailFrom:<\/span><span style=\"font-weight: 400;\"> domain or the DKIM <\/span><span style=\"font-weight: 400;\">d=<\/span><span style=\"font-weight: 400;\"> domain, helping to ensure that the sender is who they claim to be.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We recommend implementing DKIM, SPF, and DMARC protocols for well-rounded and robust email security protection.<\/span><\/p>\n<h3><b>Are All Three Protocols Required?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Implementing these three vital authentication protocols enhances your email security significantly and:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0Signals to the world that your organization is legitimate and takes email security seriously<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Improves email deliverability rates and nurtures brand trust since hackers will find it difficult to spoof your domain for fraudulent activities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protects your customers, partners, and other third parties from fraudulent exploits in your domain name.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By verifying the legitimacy of a sender, SPF, DKIM, and DMARC combine forces to prevent email spoofing and phishing attacks.<\/span><\/p>\n<h2><b>How to Get Started<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When <a href=\"https:\/\/easydmarc.com\/blog\/forpsi-spf-and-dkim-configuration\/\">setting up your SPF, DKIM<\/a>, and DMARC policy, it\u2019s essential you do it in the correct order. Remember that implementation is a multi-stage process that takes time to reach ultimate DMARC compliance with <a href=\"https:\/\/easydmarc.com\/blog\/survalyzer-spf-and-dkim-configuration\/\">SPF and DKIM<\/a>. Fortunately, we have an extensive range of free tools and managed solutions to help you achieve that.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/spf-start-your-journey-toward-dmarc-compliance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC compliance starts with SPF<\/span><\/a><span style=\"font-weight: 400;\">. Implement this protocol first by creating your SPF record. With EasyDMARC, you can easily:<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/spf-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check your SPF records<\/span><\/a><span style=\"font-weight: 400;\"> to see whether an SPF record is published for your domain and if it\u2019s deployed correctly.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/spf-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Generate your SPF record<\/span><\/a><span style=\"font-weight: 400;\"> instantly without worrying about syntax typos and errors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/spf-record-raw-check-validate\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Validate your SPF record<\/span><\/a><span style=\"font-weight: 400;\"> before publishing it to your DNS to ensure the correct configuration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/easy-spf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Use our EasySPF tools<\/span><\/a><span style=\"font-weight: 400;\"> to solve any other configuration issues like the common \u201ctoo many DNS lookups\u201d error.<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/dkim-another-step-to-dmarc-compliance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM is the next step to DMARC compliance<\/span><\/a><span style=\"font-weight: 400;\">. Once SPF is running smoothly, it\u2019s time to implement DKIM. With EasyDMARC, you can:<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check your DKIM records<\/span><\/a><span style=\"font-weight: 400;\"> to see if any exist on your domain and whether they\u2019re valid.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Generate your DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> within seconds for your dedicated mail servers.<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Once you\u2019ve confirmed that DKIM is running correctly, you can focus on <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-implement-dmarc-with-easydmarc\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC deployment<\/span><\/a><span style=\"font-weight: 400;\">. With EasyDMARC, you can easily:<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check your domain\u2019s DMARC status with ours. <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC record checker<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Generate your DMARC record<\/span><\/a><span style=\"font-weight: 400;\"> swiftly and correctly before publishing it in your DNS.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set up and analyze your <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-failure-reports\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC failure reports<\/span><\/a><span style=\"font-weight: 400;\"> in an easy-to-understand format.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-report-analyzer\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">XML aggregate reports analyzer<\/span><\/a><span style=\"font-weight: 400;\"> for instant insights into your email infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/managed-dmarc\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">managed DMARC solution<\/span><\/a><span style=\"font-weight: 400;\"> for one-click DMARC enforcement and management across all domains.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">If you need help at any stage of your SPF, DKIM, and DMARC journey, feel free to <\/span><a href=\"https:\/\/easydmarc.com\/contact-us\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">contact us<\/span><\/a><span style=\"font-weight: 400;\">. Our expert team can guide you through the various processes and stages.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">SPF, DKIM, and DMARC authentication protocols are vital for organizations looking to protect themselves from malicious emails and ensure excellent email deliverability. DMARC deployment requires technical expertise, and DMARC authentication has never been easier with our managed solution. <\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"maxbutton-1 maxbutton maxbutton-sign-up\" title=\"SIGN UP FREE\" href=\"https:\/\/app.easydmarc.com\/register\"><span class='mb-text'>Sign Up Free<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SPF, DKIM, and DMARC are the three most &#8230;<\/p>\n","protected":false},"author":1,"featured_media":43125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,291,203],"tags":[],"class_list":["post-31489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-email-authentication","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SPF vs. DKIM vs. DMARC | EasyDMARC<\/title>\n<meta name=\"description\" content=\"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SPF vs. DKIM vs. DMARC: Your Ultimate Guide\" \/>\n<meta property=\"og:description\" content=\"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-26T09:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T08:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"SPF vs. DKIM vs. DMARC: Your Ultimate Guide\",\"datePublished\":\"2024-11-26T09:56:00+00:00\",\"dateModified\":\"2025-10-15T08:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/\"},\"wordCount\":2079,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DKIM-vs.-SPF-vs.-DMARC-1.jpg\",\"articleSection\":[\"Blog\",\"Email Authentication\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/\",\"name\":\"SPF vs. DKIM vs. DMARC | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DKIM-vs.-SPF-vs.-DMARC-1.jpg\",\"datePublished\":\"2024-11-26T09:56:00+00:00\",\"dateModified\":\"2025-10-15T08:55:00+00:00\",\"description\":\"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DKIM-vs.-SPF-vs.-DMARC-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DKIM-vs.-SPF-vs.-DMARC-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"DKIM SPF DMARC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/whats-the-difference-between-spf-dkim-and-dmarc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Email Authentication\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/email-authentication\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"SPF vs. DKIM vs. DMARC: Your Ultimate Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<meta property=\"og:video\" content=\"https:\/\/www.youtube.com\/embed\/KO7ecn4itq4\" \/>\n<meta property=\"og:video:type\" content=\"text\/html\" \/>\n<meta property=\"og:video:duration\" content=\"245\" \/>\n<meta property=\"og:video:width\" content=\"480\" \/>\n<meta property=\"og:video:height\" content=\"270\" \/>\n<meta property=\"ya:ovs:adult\" content=\"false\" \/>\n<meta property=\"ya:ovs:upload_date\" content=\"2024-11-26T09:56:00+00:00\" \/>\n<meta property=\"ya:ovs:allow_embed\" content=\"true\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SPF vs. DKIM vs. DMARC | EasyDMARC","description":"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/","og_locale":"en_US","og_type":"article","og_title":"SPF vs. DKIM vs. DMARC: Your Ultimate Guide","og_description":"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?","og_url":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2024-11-26T09:56:00+00:00","article_modified_time":"2025-10-15T08:55:00+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"SPF vs. DKIM vs. DMARC: Your Ultimate Guide","datePublished":"2024-11-26T09:56:00+00:00","dateModified":"2025-10-15T08:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/"},"wordCount":2079,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","articleSection":["Blog","Email Authentication","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/","url":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/","name":"SPF vs. DKIM vs. DMARC | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","datePublished":"2024-11-26T09:56:00+00:00","dateModified":"2025-10-15T08:55:00+00:00","description":"SPF, DKIM, and DMARC are email authentication protocols essential for top email security. But why do you need all three?","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","width":1440,"height":910,"caption":"DKIM SPF DMARC"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/whats-the-difference-between-spf-dkim-and-dmarc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"Email Authentication","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/email-authentication\/"},{"@type":"ListItem","position":5,"name":"SPF vs. DKIM vs. DMARC: Your Ultimate Guide"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]},"og_video":"https:\/\/www.youtube.com\/embed\/KO7ecn4itq4","og_video_type":"text\/html","og_video_duration":"245","og_video_width":"480","og_video_height":"270","ya_ovs_adult":"false","ya_ovs_upload_date":"2024-11-26T09:56:00+00:00","ya_ovs_allow_embed":"true"},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/DKIM-vs.-SPF-vs.-DMARC-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=31489"}],"version-history":[{"count":7,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31489\/revisions"}],"predecessor-version":[{"id":53910,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31489\/revisions\/53910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/43125"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=31489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=31489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=31489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}