Having trouble with your emails from LeadSimple not being delivered, receiving error messages, or seeing contacts automatically unsubscribing?
There was a recent policy change by Google and Yahoo to reduce spam that has affected the deliverability of emails. If your email domain doesn’t meet the new policies, your emails will be blocked by Google and Yahoo. This includes emails sent through your connected email account by LeadSimple, and we are seeing an increasing number of clients affected by this.
Currently LeadSimple handles bouncebacks we receive by unsubscribing the contact; we are actively adjusting the error to be more clear when it is a bounceback from Google or Yahoo due to missing SPF, DMARC, and DKIM records.
To fix this issue and get your domain up to date with the new policies, you will need to follow the instructions of your email provider to set up SPF, DMARC, and DKIM records in your DNS provider.
🔥 Please note that while we have linked those instructions below, we HIGHLY recommend working directly with your domain host, email provider, or IT manager to set this up as it is highly technical.
More Details on the Policy Updates
More Details on the Policy Updates
In October 2023, Google and Yahoo announced stricter policies for bulk senders with the goal of reducing spam. Those policies require email messages to be authenticated and an easy way to unsubscribe from those messages.
In February 2024, the rules started being enforced. If your domain doesn’t meet them, email messages from your domain will be blocked by Google and Yahoo, meaning you’ll receive error messages related to failed authentication against SPF, DMARC or DKIM records for your domain (e.g. reply codes 421, 451 or 550, and status codes 4.7.26 or 5.7.26).
While LeadSimple offers features to compose messages, it’s an email service provider like Gmail or Outlook that actually sends them. In order to authenticate email messages from your domain, you must follow the instructions they provide to set up SPF, DMARC and DKIM records in your DNS provider.
Email authentication in Microsoft 365 (Microsoft)
Tackling Email Spoofing and Phishing (Cloudflare)
Setting up SPF, DKIM, and DMARC records is a critical step in ensuring your email domain's security and reliability. Here’s a straightforward guide for setting these up using Gmail (Google Workspace) or Outlook (Microsoft 365). This will help prevent your emails from being marked as spam and protect against email spoofing.
Setting Up SPF, DMARC, and DKIM records
For Gmail Users
For Gmail Users
Find more info in Google's guide right here. You may also find this article useful.
Note: If a business sends up to 5,000 messages a day, either SPF or DKIM is enough. If it sends more than 5,000 messages a day, SPF, DKIM and DMARC are all required. Source: here and here.
Step 1: Set up SPF
Log in to your domain’s DNS provider (where you registered your domain).
Navigate to the section where you can manage DNS settings.
Check if there is an existing TXT record whose value starts with "v=spf1".
If there isn't, create a new TXT record with the following values:
Name/Host/Alias: @ or leave blank (depends on the DNS host)
Value/Text: v=spf1 include:_spf.google.com mx ~all
TTL (Time to Live): Set this to the default, or use 3600 (1 hour)
If there is, edit the existing record by appending include:_spf.google.com to the list of existing values.
Save the record.
Step 2: Set up DKIM
Sign in to your Google Admin console (admin.google.com).
Go to Apps > Google Workspace > Gmail.
Click Authenticate email.
Select your domain and then “Generate new record”. Choose a DKIM key bit length (recommend 2048 bits).
Copy the DKIM record generated.
Go back to your domain’s DNS settings and add a new TXT record:
Name/Host/Alias: Enter what’s provided by Google (usually something like “google._domainkey”)
Value/Text: Paste the DKIM value you copied
TTL: 3600
Save the record and then go back to the Google Admin console to “Start authentication”.
Step 3: Set up DMARC
Go to your domain’s DNS settings.
Add a new TXT record:
Name/Host/Alias: _dmarc
Value/Text: v=DMARC1; p=none; rua=mailto:yourname@yourdomain.com
TTL: 3600
Save the record. This setup tells email servers to send reports about emails (passing/failing DMARC) to your specified email address but not to enforce any policy yet.
For Outlook Users
For Outlook Users
Learn more in Microsoft's troubleshooting guide here.
Note: If a business sends up to 5,000 messages a day, either SPF or DKIM is enough. If it sends more than 5,000 messages a day, SPF, DKIM and DMARC are all required. Source: here and here.
Step 1: Set up SPF
Log in to your DNS management console.
Check if there is an existing TXT record whose value starts with "v=spf1".
If there isn't, create a new TXT record for SPF:
Name/Host/Alias: @ or leave blank
Value/Text: v=spf1 include:spf.protection.outlook.com mx ~all
TTL: 3600
If there is, edit the existing record by appending include:spf.protection.outlook.com to the list of existing values.
Save the record.
Step 2: Set up DKIM
Sign in to Microsoft 365 admin center.
Go to Settings > Domains.
Choose your domain and find the option to Manage DKIM.
Select “Enable” for DKIM, which will prompt you to add two CNAME records to your DNS settings.
Add these CNAME records in your DNS settings:
Names/Hosts/Aliases and Values will be provided by Microsoft
TTL: 3600
Save the records.
Step 3: Set up DMARC
Add a new TXT record in your DNS settings:
Name/Host/Alias: _dmarc
Value/Text: v=DMARC1; p=none; rua=mailto:yourname@yourdomain.com
TTL: 3600
Save the record.
Last Step: Verify your Setup
After setting up SPF, DKIM, and DMARC records, it usually takes up to 48 hours for these changes to propagate across the internet. Here's how to check if everything is configured correctly:
Step 1: Verify SPF and DKIM
Go to the MXToolbox website: https://mxtoolbox.com/SuperTool.aspx.
Choose “SPF Record Lookup” to check your SPF record.
Select “DKIM Record Lookup” and enter your selector and domain to verify the DKIM setup.
Step 2: Verify DMARC
Go to the MXToolbox website: https://mxtoolbox.com/SuperTool.aspx.
Choose “DMARC Record Lookup” and input your domain to see if your DMARC record is recognized.
Step 3: Receive DMARC reports
Ensure you’ve provided an email address in your DMARC record to receive reports about email delivery statistics. These reports will help you monitor how emails from your domain are being handled on the receiving end.
These tools provide a straightforward way to confirm that your email security settings are active and functioning correctly. If there are issues, the tools often give hints or errors about what might be wrong, helping you troubleshoot effectively.
FAQ's:
Q: Do I need to update all three records or is one enough?