
What Requires Attention
The BIG Questions
Domain Overview
Technical Findings
Email Authentication
Mail Transport Security
DNS Security
Brand & Certificate Controls
Priority Actions 5 total Achievable: Low Risk
Change your DMARC policy from p=none to p=quarantine (then p=reject). Review your DMARC aggregate reports first to ensure legitimate senders pass authentication.
DANE/TLSA records are published but DNSSEC is not enabled. DANE requires DNSSEC to work — without it, TLSA records cannot be authenticated and are ignored by validating resolvers (RFC 7672 §2.2). Enable DNSSEC first.
Publish an MTA-STS DNS record and host a policy file at https://mta-sts.red.com/.well-known/mta-sts.txt. This tells senders to require TLS when delivering mail to your domain.
TLS-RPT (TLS Reporting) sends you reports about TLS connection failures when other servers try to deliver mail to your domain. Helps diagnose MTA-STS and STARTTLS issues.
DNSSEC (DNS Security Extensions) cryptographically signs DNS responses, preventing attackers from forging DNS answers. Contact your DNS hosting provider to enable DNSSEC signing.
Appendix — Additional Resources
Full technical details including raw DNS records, DKIM public keys, IP/ASN mappings, resolver consensus evidence, and verification commands are available in the Engineer's DNS Intelligence Report.
Verify Report Integrity SHA-3-512 Has this report been tampered with? Verify below
Tamper-evident fingerprint binding this analysis to its data, domain, timestamp, and tool version.
59de34c07bd0165cc0b5c316daf9d0b8fc9e6cd2fb701336f2bf048ae38c117584756e49766eec6bf3c4d8b6f8d0145fb4299bb83b6b9916514cfc12ecda87b6
