We’ve added a new how-to guide to our Literature page. This guide explains how DMARC (Domain-Based Message Authentication, Reporting & Conformance) works. DMARC takes the guesswork out of determining what to do with messages that did not originate from the domain specified in the From field of the message. When a message fails DKIM and SPF lookups, DMARC allows domain administrators to tell receiving mail server administrators or mailbox providers what to do with the message, such as accept, quarantine, or reject the message. Forensic and aggregate reports allow domain administrators to see how, when and where their domain is being abused.
Published by Brad Wyro
As technical marketing specialist, I am responsible for maintaining the company's Twitter and Spiceworks (social networking for the IT community) presence. Responsible for delivering a complete software training solution to partners and customers. Projects include design, creation, implementation and oversight of complete, interactive eLearning courses for MDaemon and SecurityGateway using Camtasia and Atrixware, and creation of all quick-start guides and training videos, providing live, web-based training for partners and distributors, and assisting others in the Marketing department with requests for technical guidance and idea generation on marketing-related website content and print deliverables. Provided on-premise training to approximately 60 colleagues at parent company (Research in Motion) headquarters in Waterloo, Canada, and gave live presentations at other company events, including BlackBerry World in Orlando, Florida. View all posts by Brad Wyro