Results for uol.com.br
Analysis performed on April 15, 2026 at 03:03 PM
SPF
OKv=spf1 include:spf.uol.com.br include:spfexcl.uol.com.br include:relays.uol.com.br -allDKIM
OKSelectors: s1, s2DMARC
Warningv=DMARC1; p=none; sp=none; pct=100; rua=mailto:dmarc@uol.com.br; ruf=mailto:dmarc@uol.com.br; fo=1MX
OKmx.uol.com.brRecommendations
1Change your DMARC policy from p=none to p=reject to block spoofing
With p=none, your DMARC record only monitors — it doesn't actually block spoofed emails. Attackers can still send emails as your domain and they'll be delivered normally. Switching to p=reject instructs receiving servers to drop fraudulent messages before they reach the inbox.
2Add MTA-STS to enforce TLS encryption for incoming emails
Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.
Need help securing your domain?
If you're not sure how to apply these fixes, get in touch and we'll help you out.
Contact usBadge for your website
Display your email security score on your website.
<a href="https://spoofchecker.online/en/email-security/uol.com.br" target="_blank" rel="noopener"><img src="https://spoofchecker.online/api/badge/uol.com.br?score=73&grade=B" alt="Email security score for uol.com.br" height="28"></a>