Reference

Email Deliverability Glossary

Plain-English definitions for every term in your domain score report — with good vs. bad configuration examples and direct links to check your own domain.

Email Authentication

Sender Policy Framework

SPFCritical when missing
#spf

A DNS TXT record that specifies which mail servers are authorized to send email on behalf of your domain. Receiving mail servers check SPF to verify that inbound email claiming to be from your domain actually originated from an authorized source.

Why it matters

Without SPF, anyone can send email that appears to come from your domain. SPF is one of the three core authentication standards required by Google and Yahoo for bulk senders as of February 2024.

Good configuration

v=spf1 include:_spf.google.com -all — lists all authorized senders and ends with -all (hard fail) to reject unauthorized senders.

What to avoid

Missing SPF record, ~all (soft fail) instead of -all, or too many DNS lookups (exceeds the 10-lookup limit, causing PermError).

Check your domain →

DomainKeys Identified Mail

DKIMCritical when missing
#dkim

A cryptographic email authentication method that adds a digital signature to outgoing messages. The signature is verified against a public key published in DNS, confirming the email was not altered in transit and was authorized by the sending domain.

Why it matters

DKIM proves message integrity and sender authorization. Without DKIM, DMARC alignment cannot be achieved through the DKIM path, weakening your overall authentication posture. Required by Google and Yahoo for bulk senders.

Good configuration

2048-bit RSA key (preferred over 1024-bit), selector published in DNS, signing configured on all outbound mail streams including transactional and marketing.

What to avoid

No DKIM record, 1024-bit key (considered weak), DKIM configured for one sending stream but not others, or key not rotated in years.

Check your domain →

Domain-based Message Authentication, Reporting & Conformance

DMARCCritical when missing
#dmarc

A DNS policy record that ties SPF and DKIM together and tells receiving mail servers what to do when authentication checks fail. DMARC also enables aggregate (rua) and forensic (ruf) reporting so domain owners can see who is sending email on their behalf.

Why it matters

DMARC is the enforcement layer of email authentication. Without it, SPF and DKIM provide no protection against domain spoofing. p=reject is the gold standard — it tells receivers to discard emails that fail authentication. Required by Google and Yahoo for bulk senders.

Good configuration

v=DMARC1; p=reject; rua=mailto:[email protected]; adkim=s; aspf=s — enforced policy with aggregate reporting enabled.

What to avoid

p=none (monitoring only, no enforcement), missing DMARC record, or rua pointing to an unmonitored address.

Check your domain →

Brand Indicators for Message Identification

BIMIImportant to configure
#bimi

A DNS standard that allows brands to display their logo in the inbox beside authenticated emails. BIMI requires DMARC at p=quarantine or p=reject, a Verified Mark Certificate (VMC) for Gmail, and an SVG logo published at a DNS-specified URL.

Why it matters

BIMI increases brand visibility and trust in the inbox. Emails with brand logos see higher open rates. It also signals to receivers that your domain has strong authentication in place.

Good configuration

v=BIMI1; l=https://yourdomain.com/logo.svg; a=https://yourdomain.com/vmc.pem — with DMARC p=reject and a valid VMC from DigiCert or Entrust.

What to avoid

BIMI record present but DMARC not at p=reject, SVG not in correct format, or VMC expired/missing.

Check your domain →

Authenticated Received Chain

ARC
#arc

A protocol that preserves email authentication results across mail forwarding and mailing list scenarios. When an intermediary server modifies a message (breaking DKIM), ARC provides a chain of custody so the final receiver can still evaluate the original authentication.

Why it matters

ARC solves the forwarding problem — emails forwarded through mailing lists or third-party services often fail DKIM because the message is modified. ARC allows receivers to trust the original authentication even after forwarding.

Good configuration

ARC is implemented by mail servers and intermediaries, not by domain owners. Ensure your ESP supports ARC signing.

What to avoid

No action needed from domain owners unless running your own mail infrastructure.

Check your domain →

DMARC Alignment

Critical when missing
#dmarc-alignment

The requirement that the domain in the From: header matches the domain used in SPF (Return-Path) or DKIM (d= tag) authentication. Strict alignment requires an exact match; relaxed alignment allows subdomain matches.

Why it matters

DMARC only provides protection when alignment passes. A domain can have valid SPF and DKIM but still fail DMARC if the authenticated domains don't align with the From: header — which is what recipients actually see.

Good configuration

From: header domain matches the DKIM d= tag or SPF Return-Path domain. Use strict alignment (adkim=s; aspf=s) where possible.

What to avoid

ESP sends from a different domain in the Return-Path or uses a DKIM key signed for a different domain, causing alignment failure.

Check your domain →

Transport Security

Mail Transfer Agent Strict Transport Security

MTA-STSImportant to configure
#mta-sts

A standard that allows domain owners to declare that their mail servers support TLS encryption and that sending servers should refuse to deliver email if TLS cannot be established. Implemented via a DNS TXT record and a policy file hosted at a well-known HTTPS URL.

Why it matters

Without MTA-STS, email can be downgraded from encrypted TLS to plaintext SMTP by a man-in-the-middle attacker. MTA-STS enforces encryption for inbound mail delivery.

Good configuration

_mta-sts DNS TXT record + policy file at https://mta-sts.yourdomain.com/.well-known/mta-sts.txt with mode: enforce.

What to avoid

No MTA-STS record, mode: testing (not enforced), or policy file unreachable over HTTPS.

Check your domain →

TLS Reporting

TLS-RPTImportant to configure
#tls-rpt

A DNS TXT record at _smtp._tls.yourdomain.com that specifies where sending mail servers should send reports about TLS connectivity failures when delivering to your domain. Complements MTA-STS.

Why it matters

TLS-RPT provides visibility into TLS negotiation failures, certificate errors, and MTA-STS policy violations. Without it, you have no insight into whether your inbound mail encryption is actually working.

Good configuration

v=TLSRPTv1; rua=mailto:[email protected] — pointing to a monitored address.

What to avoid

Missing TLS-RPT record, or rua pointing to an unmonitored address.

Check your domain →

DNS-based Authentication of Named Entities

DANE
#dane

A protocol that uses DNSSEC-signed TLSA records to publish the expected TLS certificate for a mail server, allowing sending servers to verify the certificate without relying on a certificate authority.

Why it matters

DANE provides a stronger guarantee of TLS certificate authenticity than the CA system. It prevents certificate substitution attacks. Requires DNSSEC to be enabled.

Good configuration

TLSA record published at _25._tcp.mail.yourdomain.com, DNSSEC enabled, certificate matches the published hash.

What to avoid

TLSA record present but DNSSEC not enabled (DANE is invalid without DNSSEC), or certificate mismatch.

Check your domain →

Domain Name System Security Extensions

DNSSECImportant to configure
#dnssec

A suite of extensions that adds cryptographic signatures to DNS records, allowing resolvers to verify that DNS responses have not been tampered with in transit.

Why it matters

Without DNSSEC, DNS responses can be forged by attackers (DNS cache poisoning). DNSSEC protects the integrity of your SPF, DKIM, DMARC, and MX records. Required for DANE.

Good configuration

DNSSEC enabled at registrar, DS records published, DNSKEY records signed and valid.

What to avoid

DNSSEC not enabled, expired signatures, or DS records missing at the parent zone.

Check your domain →

Web & DNS Security

HTTP Strict Transport Security

HSTSImportant to configure
#hsts

An HTTP response header that instructs browsers to only connect to your site over HTTPS for a specified duration. Once a browser sees the HSTS header, it will refuse to connect over HTTP for the declared max-age period.

Why it matters

HSTS prevents SSL stripping attacks where an attacker downgrades your HTTPS connection to HTTP. It also protects users who accidentally type http:// instead of https://.

Good configuration

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload — one year, all subdomains, submitted to browser preload list.

What to avoid

Missing HSTS header, max-age too short (under 6 months), or HSTS sent over HTTP (invalid — must only be sent over HTTPS).

Check your domain →

Content Security Policy

CSPImportant to configure
#csp

An HTTP response header that controls which resources (scripts, styles, images, fonts) a browser is allowed to load for your page. CSP is a primary defense against cross-site scripting (XSS) attacks.

Why it matters

XSS attacks can steal session cookies, redirect users to phishing pages, or inject malicious content. A well-configured CSP significantly reduces the attack surface.

Good configuration

Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-{random}'; — restrictive policy with nonce-based script allowlisting.

What to avoid

Missing CSP header, or CSP with unsafe-inline or unsafe-eval which defeats most XSS protections.

Check your domain →

Certification Authority Authorization

CAAImportant to configure
#caa

A DNS record that specifies which certificate authorities (CAs) are authorized to issue SSL/TLS certificates for your domain. Prevents unauthorized certificate issuance.

Why it matters

Without CAA records, any CA can issue a certificate for your domain. CAA records reduce the risk of certificate misissuance by rogue or compromised CAs.

Good configuration

0 issue "letsencrypt.org" — or whichever CA you use. Add 0 iodef "mailto:[email protected]" for violation reporting.

What to avoid

No CAA record (any CA can issue), or CAA record listing a CA you no longer use.

Check your domain →

HTTPS Redirect

Critical when missing
#https-redirect

The configuration that automatically redirects all HTTP traffic to HTTPS, ensuring users always connect over an encrypted connection regardless of which protocol they use to access your site.

Why it matters

Without an HTTP→HTTPS redirect, users who access your site over HTTP are exposed to eavesdropping and man-in-the-middle attacks. It also affects trust signals evaluated by email security filters.

Good configuration

HTTP 301 redirect from http://yourdomain.com to https://yourdomain.com, enforced at the web server or CDN level.

What to avoid

HTTP returns 200 (no redirect), or redirect is a 302 (temporary) instead of 301 (permanent).

Check your domain →

SSL/TLS Certificate

Critical when missing
#ssl-cert

A digital certificate that authenticates a website's identity and enables encrypted HTTPS connections. Certificates are issued by trusted Certificate Authorities (CAs) and have an expiration date.

Why it matters

An expired or invalid certificate causes browser warnings that destroy user trust and can affect email deliverability — receiving servers may check your web presence as part of reputation evaluation.

Good configuration

Valid certificate, not expiring within 30 days, issued by a trusted CA, covering the correct domain names.

What to avoid

Expired certificate, self-signed certificate, certificate for wrong domain, or expiring within 14 days.

Check your domain →

Domain Signals

Mail Exchanger Record

MXCritical when missing
#mx

A DNS record that specifies the mail servers responsible for accepting email for a domain. MX records include a priority value — lower numbers indicate higher priority.

Why it matters

Without valid MX records, email cannot be delivered to your domain. Misconfigured MX records (pointing to non-existent hosts, wrong priority) cause delivery failures.

Good configuration

MX records pointing to valid, resolvable hostnames with correct priority values. Primary and backup MX servers configured.

What to avoid

No MX record, MX pointing to an IP address (invalid — must be a hostname), or MX pointing to a CNAME (also invalid).

Check your domain →

Pointer Record (Reverse DNS)

PTRImportant to configure
#ptr

A DNS record that maps an IP address back to a hostname. For email, the PTR record of the sending IP should resolve to a hostname that forward-resolves back to the same IP (FCrDNS — Forward-Confirmed Reverse DNS).

Why it matters

Many receiving mail servers check PTR records as a spam signal. A sending IP without a valid PTR record, or with a PTR that doesn't match the HELO/EHLO hostname, increases spam filter scores.

Good configuration

PTR record for sending IP resolves to a hostname that forward-resolves back to the same IP. Hostname matches the HELO/EHLO name used by the mail server.

What to avoid

No PTR record, PTR resolves to a generic hostname (e.g., dynamic-ip-1.2.3.4.isp.com), or forward/reverse DNS mismatch.

Check your domain →

Domain Age

Important to configure
#domain-age

The length of time a domain has been registered. Spam filters and inbox providers use domain age as one signal in sender reputation scoring — newer domains are treated with more suspicion.

Why it matters

Newly registered domains have no sending history and no established reputation. Sending high volumes from a new domain without a warmup plan results in poor inbox placement.

Good configuration

Domain registered for 12+ months with consistent, low-volume sending history before scaling up.

What to avoid

Domain registered within the last 3 months, or domain with a gap in sending history followed by sudden high volume.

Check your domain →

TLD Reputation

Critical when missing
#tld-reputation

The spam and abuse reputation associated with a top-level domain (TLD). Some TLDs (.tk, .ml, .ga, .cf, .xyz, .top) are heavily associated with spam and phishing, causing inbox providers to apply stricter filtering to all domains on those TLDs.

Why it matters

Authentication records alone cannot overcome TLD-level reputation penalties. A domain on a high-abuse TLD will face elevated spam filter scores regardless of how well-configured its SPF, DKIM, and DMARC are.

Good configuration

.com, .org, .net, .edu, .gov, or established country-code TLDs (.co.uk, .com.au, .de, etc.).

What to avoid

.tk, .ml, .ga, .cf, .gq, .xyz, .top, .click, .loan, .win, .bid — TLDs with documented high abuse rates.

Check your domain →

Domain Expiry

Critical when missing
#domain-expiry

The date on which a domain registration expires. If not renewed, the domain becomes available for registration by anyone — including attackers who could use it to impersonate your brand or intercept email.

Why it matters

An expired domain means your website goes offline, email stops working, and your brand identity becomes available to squatters. Domains expiring within 30 days are an active risk.

Good configuration

Domain renewed at least 1 year in advance, auto-renewal enabled, registrar contact email actively monitored.

What to avoid

Domain expiring within 30 days, auto-renewal disabled, or registrar contact email is a defunct address.

Check your domain →

Deliverability Concepts

Inbox Placement Rate

IPR
#inbox-placement

The percentage of sent emails that land in the recipient's primary inbox (as opposed to spam, promotions, or being blocked entirely). Distinct from delivery rate — an email can be delivered but still land in spam.

Why it matters

Inbox placement is the metric that actually determines whether your email program is working. A 99% delivery rate with 30% inbox placement means 30% of your emails are reaching the inbox — the rest are in spam.

Good configuration

85%+ inbox placement rate across major inbox providers (Gmail, Microsoft, Yahoo). Monitored via inbox placement testing tools.

What to avoid

Below 70% inbox placement, or significant variation across providers (high at Gmail, low at Microsoft, or vice versa).

Check your domain →

Sender Reputation

#sender-reputation

A score assigned by inbox providers to sending domains and IP addresses based on historical sending behavior. Factors include spam complaint rates, bounce rates, engagement rates, blacklist status, and authentication compliance.

Why it matters

Sender reputation is the primary factor inbox providers use to determine inbox vs. spam placement. A damaged reputation can take weeks to recover and affects all email from your domain — transactional, marketing, and operational.

Good configuration

Spam complaint rate below 0.1% (Google threshold), bounce rate below 2%, consistent sending volume, high engagement rates.

What to avoid

Complaint rate above 0.3% (Google rejection threshold), high bounce rates, sudden volume spikes, or blacklist listings.

Check your domain →

Email Blacklist (DNSBL)

DNSBLCritical when missing
#blacklist

A real-time database of IP addresses and domains known or suspected to send spam. Mail servers query these lists during the SMTP connection to decide whether to accept, reject, or flag incoming email.

Why it matters

A blacklist listing causes immediate delivery failures or spam placement at any mail server that queries that list. Major blacklists (Spamhaus, Barracuda, SORBS) are checked by most enterprise mail servers.

Good configuration

Not listed on any major blacklists. Monitoring in place to detect new listings within hours.

What to avoid

Listed on Spamhaus ZEN, Barracuda, SORBS, or Microsoft SNDS — each requires a separate delisting request.

Check your domain →

Email List Hygiene

#list-hygiene

The practice of regularly removing invalid, inactive, or risky email addresses from your sending list. Includes removing hard bounces, spam trap addresses, role-based addresses, and disengaged contacts.

Why it matters

Email lists decay at roughly 22% per year. Sending to stale lists increases bounce rates, spam complaints, and spam trap hits — all of which damage sender reputation. Clean lists improve deliverability and reduce ESP costs.

Good configuration

Full list audit twice per year, real-time validation at sign-up, suppression of contacts with 6–12 months of no engagement.

What to avoid

No list cleaning in 12+ months, sending to purchased lists, no bounce suppression, or no unsubscribe mechanism.

Check your domain →

Email Validation

#email-validation

The process of verifying in real-time or in bulk whether an email address is syntactically valid, belongs to a real domain, and has an active mailbox — before sending to it.

Why it matters

Sending to invalid addresses causes hard bounces, which damage sender reputation. Real-time validation at sign-up prevents bad addresses from entering your list in the first place.

Good configuration

Real-time MX and mailbox validation at point of entry, bulk validation before major campaigns, integration with ESP bounce handling.

What to avoid

No validation at sign-up, no bulk validation before campaigns, or relying solely on ESP bounce handling after the fact.

Check your domain →

Mailbox / IP Warmup

#warmup

The process of gradually increasing sending volume from a new domain or IP address to build a positive reputation with inbox providers before sending at full scale.

Why it matters

Inbox providers are suspicious of new senders who immediately send high volumes — it is a pattern associated with spam. Skipping warmup is one of the most common reasons new email programs fail immediately.

Good configuration

Structured warmup plan: start with 50–100 emails/day to highly engaged contacts, double volume every 2–3 days over 4–6 weeks, monitor complaint and bounce rates throughout.

What to avoid

Sending full volume on day one, no warmup plan, or restarting sending at full volume after a long period of inactivity.

Check your domain →

Feedback Loop

FBL
#feedback-loop

A service offered by inbox providers that notifies senders when a recipient marks their email as spam. Senders use FBL data to identify and suppress complainers from future sends.

Why it matters

Without FBL enrollment, you have no direct visibility into spam complaints. High complaint rates (above 0.1% at Google) trigger inbox placement penalties. FBL data allows you to suppress complainers before they damage your reputation.

Good configuration

FBL enrolled at all major providers that offer it (Yahoo, Comcast, AOL). Complaints automatically suppressed in your ESP.

What to avoid

No FBL enrollment, complaints not automatically suppressed, or FBL data not monitored.

Check your domain →

One-Click Unsubscribe

RFC 8058Critical when missing
#one-click-unsubscribe

A mechanism (defined in RFC 8058) that allows recipients to unsubscribe from a mailing list with a single click directly from the inbox interface, without visiting a landing page. Implemented via the List-Unsubscribe and List-Unsubscribe-Post headers.

Why it matters

Required by Google and Yahoo for bulk senders as of February 2024. Without one-click unsubscribe, bulk senders face rejection or spam placement at Gmail and Yahoo Mail. It also reduces spam complaints by giving recipients an easy alternative to the spam button.

Good configuration

List-Unsubscribe: <https://youresp.com/unsub?id=xxx> and List-Unsubscribe-Post: List-Unsubscribe=One-Click headers present on all bulk email.

What to avoid

Missing List-Unsubscribe header, or header present but List-Unsubscribe-Post missing (not one-click compliant).

Check your domain →

DMARC Aggregate Reporting (rua)

ruaImportant to configure
#dmarc-rua

The rua= tag in a DMARC record specifies where aggregate XML reports should be sent. These reports are generated by receiving mail servers and show authentication pass/fail rates, sending sources, and policy application for your domain.

Why it matters

DMARC aggregate reports are the primary tool for understanding who is sending email on behalf of your domain. Without rua= configured, you are flying blind — you cannot detect unauthorized senders, misconfigured services, or authentication failures.

Good configuration

rua=mailto:[email protected] pointing to a monitored address, or a DMARC reporting service (dmarcian, EasyDMARC, Valimail, Postmark).

What to avoid

No rua= tag, rua pointing to an unmonitored address, or reports never reviewed.

Check your domain →

DMARC Forensic Reporting (ruf)

ruf
#dmarc-ruf

The ruf= tag in a DMARC record specifies where forensic (failure) reports should be sent. These reports contain individual message samples that failed DMARC authentication.

Why it matters

ruf= reports are rarely honored by major inbox providers (Gmail and Microsoft do not send them). They also contain message content that may include personal data, creating GDPR/CASL/PIPL compliance exposure. Most organizations should not configure ruf=.

Good configuration

ruf= omitted entirely. Use rua= aggregate reports for visibility instead.

What to avoid

ruf= configured and pointing to an address that stores message content without appropriate data handling controls.

Related Terms
Check your domain →

Integrated Cloud Email Security

ICES
#ices

A category of email security solutions that sit in front of or alongside Microsoft 365 and Google Workspace to provide advanced threat protection beyond what the native platform offers. Includes anti-phishing, DLP, encryption, journaling, and security awareness training.

Why it matters

Native M365 and Google Workspace security catches commodity threats but misses sophisticated BEC (Business Email Compromise), targeted phishing, and data exfiltration attempts. ICES solutions add the layers that enterprise email security requires.

Good configuration

ICES solution deployed in inline or API mode, covering inbound threat detection, outbound DLP, email encryption, and journaling for compliance.

What to avoid

Relying solely on native M365/Google Workspace security for regulated industries or organizations handling sensitive data.

Check your domain →

See how your domain scores on these checks.

35 checks across email authentication, DNS security, and web infrastructure. Free, typically under 30 seconds.

Score Your Domain — Free