Results for alphard.com
Analysis performed on April 15, 2026 at 03:16 PM
SPF
OKv=spf1 include:ca._netblocks.mimecast.com include:spf.protection.outlook.com ip4:104.156.75.96/29 ip4:142.112.30.216 ip4:142.112.40.181 -allDMARC
Warningv=DMARC1; p=quarantine; sp=quarantine; pct=100; adkim=r; aspf=r; fo=1; rua=mailto:dmarc@alphard.comMX
OKca-smtp-inbound-1.mimecast.com, ca-smtp-inbound-2.mimecast.comRecommendations
1Upgrade your DMARC policy from p=quarantine to p=reject for full blocking
With p=quarantine, spoofed emails are sent to spam instead of being blocked outright. Some recipients still check spam folders, and sophisticated attacks can be flagged as legitimate by users. p=reject ensures fraudulent emails never reach any folder.
2Enable DKIM in your email provider and add the public key to your DNS zone
DKIM adds a cryptographic signature to your emails, proving they haven't been tampered with in transit and genuinely originated from your domain. Without it, attackers can forge emails that pass basic checks, and your legitimate emails are more likely to land in spam.
3Add MTA-STS to enforce TLS encryption for incoming emails
Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.
Need help securing your domain?
If you're not sure how to apply these fixes, get in touch and we'll help you out.
Contact usBadge for your website
Display your email security score on your website.
<a href="https://spoofchecker.online/en/email-security/alphard.com" target="_blank" rel="noopener"><img src="https://spoofchecker.online/api/badge/alphard.com?score=57&grade=C" alt="Email security score for alphard.com" height="28"></a>