DMARC policies provide for the definition of three different action levels: it is not: quarantine: reject. In the first case, messages from an unauthorized sender will be marked as unauthenticated , but will not be blocked. In the second case, however, unauthorized messages will be sent to a sort of quarantine , where they can be evaluated and analyzed before being delivered to the recipient. Finally, in the third case, all messages from unauthorized senders will be immediately rejected and will not be delivered to the recipient. The configuration must be done by inserting a TXT record in the DNS of your domain.
The configuration, in this case, is optional and must be currency data requested from technical support. Strong Passwords: Five Tips for Protecting Your Accounts Email Spoofing: Final Tips There are some basic guidelines to constantly refer to in order to protect your online activity: Use strong passwords Use strong, randomly generated passwords for all your email accounts. A strong, unique password can prevent hackers from breaking into your account, protecting your company's sensitive data. Install antivirus software Equip your employees' workstations with reliable Antivirus or Endpoint Protection software. These tools can detect, prevent and remove viruses, spyware and other types of malware.
Protect your network with a firewall Install a Next Generation . This type of firewall can cross-reference data and content to identify and prevent threats. The protection of your business cannot be left to chance, rely only on the most advanced and secure solutions. In the end… Don't click on links in suspicious emails . Make a habit of checking the actual address that your browser displays (bottom left) by moving your mouse over the linked text or image. Do not enter confidential information on websites that are not protected Do not open or reply to emails without first verifying the authenticity of the sender.