SPF record — strict
The exact list of servers allowed to send for your domain. Anything else fails authentication at the receiver.
SPF guide →Email is how a $425,000 wire transfer left Smithville, TN. Without SPF + DKIM + DMARC at p=reject, anyone on the internet can send mail “from” mayor@yourtown.gov — and your residents, vendors, and bank can’t tell which message is real. YesGov configures the full stack and monitors it in production.
Each control is checked nightly against the same baseline our open-data scanner runs against every U.S. government domain.
The exact list of servers allowed to send for your domain. Anything else fails authentication at the receiver.
SPF guide →Outbound mail cryptographically signed with a private key only you control. The receiver verifies via DNS public key.
DKIM guide →Receivers reject unauthenticated mail outright — not quarantine, not none. Aggregate reports flow to a monitored endpoint.
DMARC guide →Inbound mail can’t be downgraded from TLS by an attacker between mail servers. Strip attempts are refused.
MTA-STS guide →Receivers send daily reports when mail TLS fails — you find out about a problem before residents do.
TLS-RPT guide →Archiving and retention configured for state open-records statutes. Subpoena-ready exports on request.
Open-records guide →Without DMARC at p=reject, anyone can send “from” mayor@yourtown.gov. Smithville, TN lost $425K to exactly this.
An attacker between mail servers strips TLS and reads or alters messages in transit — invisible to staff.
Resident receives an “official” email demanding a fee. Without enforcement, your domain is the brand the attacker borrows.
Open-records request comes in — you can’t produce the message, the metadata, or the chain of custody.
The list of servers allowed to send for your domain — how it’s evaluated, and what 10-lookup limit catches break.
Cryptographic signing for outbound mail — key rotation, selectors, and what receivers check.
Alignment, policy modes (none / quarantine / reject), and aggregate-report parsing.
Stop TLS downgrade between mail servers — enforce mode, policy file, and DNS record.
Receive daily JSON reports when mail TLS fails for your domain.
YesGov configures all five records, sets up the reporting endpoints, monitors the aggregate reports, and hands you a compliance document your insurer will accept.