
What Requires Attention
The BIG Questions
Domain Overview
Technical Findings
Email Authentication
Mail Transport Security
DNS Security
Brand & Certificate Controls
Priority Actions 3 total Achievable: Low Risk
Change your DMARC policy from p=none to p=quarantine (then p=reject). Review your DMARC aggregate reports first to ensure legitimate senders pass authentication.
Publish an MTA-STS DNS record and host a policy file at https://mta-sts.freebsd.org/.well-known/mta-sts.txt. This tells senders to require TLS when delivering mail to your domain.
Your domain has DNSSEC + DANE — the strongest email transport security available. TLS-RPT adds operational visibility by reporting when sending servers fail DANE validation or encounter STARTTLS issues delivering to your MX hosts. It does not add security — it monitors the security you already have.
Appendix — Additional Resources
Full technical details including raw DNS records, DKIM public keys, IP/ASN mappings, resolver consensus evidence, and verification commands are available in the Engineer's DNS Intelligence Report.
Verify Report Integrity SHA-3-512 Has this report been tampered with? Verify below
Tamper-evident fingerprint binding this analysis to its data, domain, timestamp, and tool version.
09201d2c9a583570ad69ea3e20b1e31f0712a7c595cc7e0acc945a1ccfe3ab46bab0bfa09c4f310d109130203abcd8b599d88d05c40dcfec2c114920b4d9c114
