Stop Email Spoofing with SPF, DKIM, and DMARC in M365
Feb 07, 2026 Alex Davis Microsoft 365 | Email Security 4 min read
Email spoofing is a major driver of phishing, payment fraud, and brand impersonation for small and mid-sized businesses. Attackers do not need malware if they can convincingly send email that looks like it came from your domain.
SPF, DKIM, and DMARC are open email authentication standards that significantly reduce spoofing risk. If you already use Microsoft 365, you can deploy all three without buying new tools. This guide explains how each control works, why they are more effective together, and how to configure them safely in Microsoft 365 with results you can defend to executives, auditors, and cyber insurers.
Why SPF, DKIM, and DMARC stop email spoofing
Spoofing works because email was originally designed to trust the sender address. Without authentication, anyone can send a message that appears to come from your domain.
SPF, DKIM, and DMARC close that gap by answering three different questions.
What SPF actually verifies
SPF, or Sender Policy Framework, checks whether the server that sent the message is authorized to send mail for your domain. You publish this authorization as a DNS TXT record.
If a message claiming to be from your domain is sent from an unapproved server, SPF fails. SPF validates the sending path, not the message content.
What DKIM actually verifies
DKIM, or DomainKeys Identified Mail, cryptographically signs each outgoing message. Receiving mail systems verify the signature using a public key published in DNS.
If the message is altered in transit or was not signed by an authorized sender, DKIM fails. DKIM validates message integrity and sender authenticity.
What DMARC actually enforces
DMARC, or Domain-based Message Authentication, Reporting, and Conformance, ties SPF and DKIM together and tells receivers what to do when authentication fails.
DMARC also requires domain alignment. This means SPF or DKIM must authenticate using the same domain shown in the visible From address. Without alignment, SPF or DKIM passing alone is not enough.
DMARC adds reporting, which lets you see who is sending mail on behalf of your domain and who is attempting to impersonate it. Microsoft provides a clear overview of these concepts and how they apply to cloud email in its email authentication documentation for Microsoft 365: Email authentication in Microsoft 365.
How SPF, DKIM, and DMARC work together
Each control covers a different weakness.
- SPF confirms where the message came from.
- DKIM confirms the message was not altered and was signed by an authorized sender.
- DMARC enforces policy, requires alignment, and provides visibility.
Without DMARC, spoofed messages can still be delivered even if SPF or DKIM fails. Without DKIM, forwarded messages may fail SPF. Without SPF, unsigned systems can still send on your behalf.
Together, they allow receiving mail systems to confidently reject or quarantine spoofed messages instead of delivering them to users.
Configure SPF, DKIM, and DMARC in Microsoft 365
Microsoft 365 supports SPF, DKIM, and DMARC natively. Configuration requires DNS changes and a controlled rollout.
Step 1: Inventory all sending sources
Before touching DNS, list every system that sends email as your domain. This usually includes:
- Microsoft 365 mailboxes
- Marketing platforms
- Ticketing or CRM systems
- Monitoring and alerting tools
- Legacy applications and printers
Missing a sender is the most common cause of mail disruption during DMARC enforcement.
Step 2: Configure SPF correctly
SPF is published as a DNS TXT record. For most Microsoft 365 tenants, the baseline record is:
v=spf1 include:spf.protection.outlook.com -all
Only add additional includes for systems that truly send mail as your domain. Avoid long include chains and avoid softfail (~all) once your configuration is stable.
Microsoft’s official guidance walks through common scenarios and edge cases: Configure SPF for Microsoft 365.
Step 3: Enable DKIM for every domain
DKIM in Microsoft 365 requires creating two CNAME records that point to Microsoft’s signing infrastructure. Once published, enable DKIM in the Microsoft 365 Defender portal.
Use standard selectors such as selector1 and selector2 and plan for periodic key rotation. Enable DKIM on all accepted domains, not just the primary one.
Microsoft’s step-by-step instructions are available here: Configure DKIM in Microsoft 365.
Step 4: Publish DMARC in monitoring mode
Start DMARC with a monitoring-only policy so you can observe traffic without impacting delivery. A common starter record is:
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; ruf=mailto:dmarc-forensics@yourdomain.com; pct=100
Review aggregate reports daily or weekly to identify unauthorized senders and misaligned legitimate systems.
Once all valid sources authenticate cleanly, move to enforcement using p=quarantine and then p=reject.
Microsoft’s configuration guide explains recommended rollout patterns: Configure DMARC for Microsoft 365.
Operational discipline that prevents breakage
Email authentication is not a one-time project. It requires ownership and process.
Align domains and segment senders
Ensure the visible From address aligns with the domains authenticated by SPF and DKIM. Require third-party vendors to DKIM-sign with your domain or use dedicated subdomains to isolate risk.
Monitor DMARC reports continuously
DMARC aggregate reports show every system attempting to send mail for your domain. Treat unknown sources as incidents until explained.
New vendors, acquisitions, or application changes frequently introduce unauthenticated traffic.
Standardize across domains
For organizations with multiple domains, standardize SPF, DKIM, and DMARC patterns and roll out changes in controlled rings. This reduces surprises and shortens troubleshooting cycles.
Train support and security teams
Microsoft 365 adds Authentication-Results headers to messages that show SPF, DKIM, and DMARC outcomes. Knowing how to read these headers speeds investigation and reduces false assumptions.
Microsoft documents common scenarios in its security operations guide: Email authentication security operations guide.
Measuring success with the right KPIs
Good metrics focus on outcomes, not just configuration.
Useful KPIs include:
- Percentage of domains at DMARC p=reject
- Percentage of outbound mail with aligned DKIM
- Number of unauthorized senders observed per week
- Time to remediate new sender misalignment
- Reduction in user-reported spoofing attempts
Email authentication is most effective when paired with additional controls such as Microsoft Defender for Office 365 anti-phishing policies, blocking external auto-forwarding, and requiring secondary verification for payment or banking changes.
FAQ
What is the difference between SPF, DKIM, and DMARC?
SPF authorizes which servers may send email for your domain. DKIM cryptographically signs messages to verify integrity and authenticity. DMARC enforces policy, requires domain alignment, and provides reporting based on SPF and DKIM results.
Can SPF, DKIM, and DMARC break legitimate email?
They can if deployed without inventory and monitoring. Starting DMARC in monitoring mode and reviewing reports prevents disruption while you fix misaligned senders.
Do I need all three to stop spoofing?
Yes. SPF or DKIM alone does not reliably stop spoofing. DMARC is required to enforce rejection or quarantine of unauthenticated messages.
Does Microsoft 365 support DMARC enforcement?
Yes. Microsoft 365 fully supports SPF, DKIM, and DMARC. Enforcement happens at receiving mail systems based on your published DMARC policy.
How long does it take to reach DMARC p=reject?
For most SMBs, 30–90 days is realistic. The timeline depends on how many third-party senders you use and how quickly they can be aligned.
Will DMARC improve email deliverability?
Yes. Proper authentication reduces spam classification and increases trust with major mailbox providers, especially when combined with DKIM signing and consistent sending patterns.
Subscribe To
Sourcepass Insights
Sourcepass Insights
Stay in the loop and never miss out on the latest updates by subscribing to our newsletter today!