Check your Sender Policy Framework (SPF)31 Jul 2020
I have created an easy tool to check your email SPF configuration (what is specified in your DNS config about what servers can send email for your @domain email addresses).
Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the emailWikipedia
SPF is basically a recursive list, implemented through DNS TXT records, that define all the IPv4 and IPv6 servers that are allowed to send emails for your domain. If someone (e.g. a spammer/phisher) tries to send an email from a different server that claims to be from your email@example.com , the receiving mail server (the one specified in your MX records) can check where it came from, and if the sending server was not in that SPF list of allowed IP addresses, the email will be regarded as suspect (and probably blocked).
If your company email is running on Office365, you should see the SPF record spf.protection.outlook.com. This means that Microsoft’s Office365/Outlook servers can send email for you. If you send emails through either the online Outlook, or the app Outlook on your PC/Mac, the emails will always go through an outgoing SMTP server on that SPF list.
If you click through, you’ll see that spf.protection.outlook.com is defined as “
v=spf1 ip4:220.127.116.11/15 ip4:18.104.22.168/16 ip4:22.214.171.124/14 ip4:126.96.36.199/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/48 include:spfd.protection.outlook.com -all“
If you use external services that send emails on your behalf (newsletters, CRM, invoicing, …) you should see an extra entry in your SPF TXT record for each of those.