Email Security Analysis of mbs.edu

Complete verification of mbs.edu's SPF, DKIM, DMARC, and MTA-STS records. Find out if this domain is protected against email spoofing.

Last updated: April 15, 2026

57C
This domain is protected against spoofing

SPF

Missing

No record found

Read the guide

DKIM

OK
Selectors: selector1, mail, s1, s2, cm

DMARC

Warning
v=DMARC1;p=quarantine;fo=1;rua=mailto:dmarc_rua@emaildefense.proofpoint.com,mailto:dmarc_agg@vali.email;ruf=mailto:dmarc_ruf@emaildefense.proofpoint.com;sp=none;aspf=r;adkim=r;
Read the guide

MX

OK
mxb-003bd301.gslb.pphosted.com, mxa-003bd301.gslb.pphosted.com

MTA-STS

Missing

No record found

Read the guide

Recommendations

  1. 1Upgrade your DMARC policy from p=quarantine to p=reject for full blocking

    With p=quarantine, spoofed emails are sent to spam instead of being blocked outright. Some recipients still check spam folders, and sophisticated attacks can be flagged as legitimate by users. p=reject ensures fraudulent emails never reach any folder.

  2. 2Add an SPF record: yourdomain TXT "v=spf1 include:yourprovider -all"

    SPF tells receiving servers which IP addresses are allowed to send email for your domain. Without it, any server in the world can send emails appearing to come from you. Adding SPF with -all (hardfail) means unauthorized senders will be rejected.

  3. 3Add MTA-STS to enforce TLS encryption for incoming emails

    Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.

Need help securing your domain?

If you're not sure how to apply these fixes, get in touch and we'll help you out.

Contact us

Run a live analysis

The results above are updated daily. For an instant check of mbs.edu, run a live analysis.

Analyze mbs.edu live

Guides to understand these results