DMARC Config Manual - Google (Squarespace)
Why do we even need DMARC records?
DMARC records are crucial for email security as they prevent email spoofing, authenticate emails, and improve deliverability by verifying that emails genuinely originate from the stated domain. They also enable domain owners to set policies on how receivers should handle emails that fail verification, enhancing protection against phishing and scams. Additionally, DMARC provides valuable reports for monitoring and addressing email-based threats.
What is the DMARC Policy?
The DMARC policy determines how email receivers should handle emails that fail DMARC verification. There are three possible policy options:
- None: The policy is set to "none" when a domain owner wants to monitor the email authentication results without taking any action. This is often used during the initial setup or testing phase.
- Quarantine: The policy is set to "quarantine" when a domain owner wants email receivers to treat emails that fail DMARC verification with suspicion. These emails may be sent to the recipient's spam or junk folder.
- Reject: The policy is set to "reject" when a domain owner wants email receivers to reject emails that fail DMARC verification. These emails will not be delivered to the recipient's inbox.
It is important to carefully consider and test the DMARC policy before implementing it to ensure legitimate emails are not mistakenly rejected or classified as spam.
To configure your DMARC record using Google Workspace follow these steps:
-
Log in to your Google Domains center using the following link: https://account.squarespace.com/domains.
-
Select the domain that needs to be updated.
-
Click the DNS option in the menu bar on the left of the newly opened page.
-
Click the 'Add record' button next to the heading 'Custom records' at the bottom of the page:
- Host name:
_dmarc - Type: choose TXT
- Data: Enter the DMARC record generated by Rotate
- Click on Save.
Frequently Asked Questions
What is the Email Add-On?
The Email Add-On is a tool designed for Gmail and Outlook that helps you identify and manage malicious emails, including spam, phishing attempts, and malware. It enhances your email security by reporting suspicious emails and managing your personal spam list.
Why are mail rules a security risk?
Mail rules can be exploited to exfiltrate data, hide security alerts, or modify incoming messages. Attackers often use forwarding rules to silently send emails to external accounts or create rules that auto-delete security notifications, making it harder to detect compromises.
Why is email security important?
Email is a common attack vector for phishing, spoofing, and other cyber threats. Properly configured DMARC, DKIM, and SPF records help prevent unauthorized parties from sending emails on behalf of your domain, protecting your organization from email-based attacks.
What actions can I take on a malicious email?
When a malicious email is detected, you can take the following actions:
- Block the email to remove it from the user’s inbox.
- Release the email after it’s been blocked, putting it back in the inbox.
Can I deactivate Rotate Mail Scanning on a specific mailbox?
Yes, you can exclude specific mailboxes from Rotate Mail Scanning. This can be configured in the Configurations tab in the Email Hub under the Users and choose the users to exclude.
What does Email Threats mean?
- Phishing: A type of cyberattack where attackers impersonate legitimate organizations via email or websites to steal sensitive information like passwords or credit card numbers.
- Financial Fraud: Illegally obtaining money or assets through deceptive means, such as credit card fraud, investment scams, or identity theft.
- BEC (Business Email Compromise): A type of cybercrime where attackers impersonate company executives or employees to trick others into transferring money or sensitive information, often through email.
- Malware: Malicious software designed to harm, exploit, or otherwise compromise the data or functionality of a computer, network, or device. Examples include viruses, trojans, and ransomware.
- Spam: Unsolicited and often irrelevant or inappropriate messages, typically sent in bulk, usually through email. Often used for advertising or spreading malicious content.