Core ConceptsΒΆ
Understanding the fundamentals of email security and how the ReputeAPI works.
OverviewΒΆ
This section covers the core concepts you need to understand to effectively use the ReputeAPI and improve your domain's email security.
Topics CoveredΒΆ
- Mailflow Security Score - How the 0-100 score is calculated
- SPF (Sender Policy Framework) - Preventing sender address forgery
- DKIM (DomainKeys Identified Mail) - Email authentication and integrity
- DMARC (Domain-based Message Authentication) - Policy enforcement
- DNS Configuration - Setting up your DNS records
- Email Authentication - How it all works together
Quick LinksΒΆ
-
π Scoring System
Understand how we calculate your Mailflow Security Score
-
π‘οΈ SPF Explained
Deep dive into Sender Policy Framework
-
π DKIM Explained
How DKIM signatures work
-
π DMARC Explained
Policy-based email authentication
Why Email Security MattersΒΆ
Email is the most common attack vector for phishing, spoofing, and business email compromise (BEC). Proper email security configuration:
β Prevents Spoofing - Stops attackers from impersonating your domain β Builds Trust - Improves email deliverability and sender reputation β Protects Brand - Prevents your domain from being used in phishing attacks β Meets Compliance - Satisfies security and privacy requirements
The Three PillarsΒΆ
Email security is built on three complementary standards:
1. SPF (Sender Policy Framework)ΒΆ
Defines which mail servers are authorized to send email for your domain.
2. DKIM (DomainKeys Identified Mail)ΒΆ
Adds cryptographic signatures to emails to verify authenticity and detect tampering.
3. DMARC (Domain-based Message Authentication)ΒΆ
Tells receiving servers what to do with emails that fail SPF or DKIM checks.
How They Work TogetherΒΆ
graph LR
A[Incoming Email] --> B{SPF Check}
B --> C{DKIM Check}
C --> D{DMARC Check}
D -->|Pass| E[Deliver to Inbox]
D -->|Fail + p=reject| F[Reject Email]
D -->|Fail + p=quarantine| G[Mark as Spam]
D -->|Fail + p=none| H[Deliver + Report]
- SPF verifies the sending server is authorized
- DKIM verifies the email hasn't been modified
- DMARC checks alignment and enforces policy
Next StepsΒΆ
- Understand the Score - Learn how we calculate your security score
- Configure DNS - Set up your email security records
- View Examples - See real-world implementations