Why are internal emails flagged as impersonation when using a 3rd party provider even with SPF and DKIM verification?

Summary

Internal emails can be flagged as impersonation despite SPF and DKIM verification due to a multitude of factors. Simple mail security setups may consider emails sent from a domain via a third-party provider to recipients within the same domain as impersonation. Restrictive internal policies and filters, especially in enterprise environments like Office 365, often override authentication protocols and flag emails based on sender patterns or aggressive anti-phishing measures. Issues during internal handoffs within email infrastructure, such as those involving Messagelabs/Microsoft, can disrupt authentication processes. Incorrect SPF, DKIM, and DMARC configurations, particularly overly strict DMARC policies (e.g., p=reject), can lead to the rejection of legitimate emails. Additionally, a low domain or IP reputation and issues related to email forwarding and multiple server hops can also invalidate authentication. If email authentication is new, the IP and domain will need to warm up.

Key findings

  • Simple Mail Security Setups: Basic security configurations often flag emails sent from a domain via a third-party provider to recipients within the same domain as impersonation.
  • Restrictive Internal Policies and Filters: Enterprise environments and internal email systems may have policies and filters that override authentication and flag emails based on sender patterns or aggressive anti-phishing measures.
  • Internal Infrastructure Issues: Internal handoffs within email infrastructure (e.g., Messagelabs/Microsoft) can disrupt the authentication process.
  • Incorrect SPF/DKIM/DMARC Configuration: Incorrect or overly strict SPF, DKIM, and DMARC policies, especially DMARC set to reject (p=reject), can cause legitimate emails to be rejected.
  • Low Domain/IP Reputation: A poor domain or IP reputation can cause emails to be flagged as impersonation despite proper authentication.
  • Email Forwarding Issues: Internal emails forwarded through external services may fail SPF checks if the forwarding server isn't authorized.
  • Multiple Server Hops: Multiple server hops can invalidate SPF/DKIM results if servers modify email headers or content after authentication.
  • Newly Authenticating Emails: When emails are newly authenticating with SPF and DKIM the email provider might not trust the domain as it does not have a reputation.

Key considerations

  • Assess Security Setups: Evaluate whether basic security setups are overly restrictive and flagging legitimate emails as impersonation.
  • Review Internal Policies and Filters: Examine internal email policies and filters to ensure they do not override authentication protocols and flag emails unnecessarily.
  • Investigate Infrastructure: Investigate and address any issues related to internal handoffs within your email infrastructure that may be disrupting authentication.
  • Adjust SPF/DKIM/DMARC Policies: Review and adjust SPF, DKIM, and DMARC policies to ensure they are correctly configured and not overly strict.
  • Improve Domain/IP Reputation: Work to improve your domain and IP reputation through consistent sending practices and low complaint rates.
  • Configure Email Forwarding: Properly configure email forwarding to ensure that forwarded emails pass SPF checks.
  • Maintain Email Integrity: Ensure all servers in the email path maintain email integrity to prevent authentication invalidation.
  • IP and Domain warm up: If you are newly authenticating, warm up your IP and domain reputation by sending a consistent volume of emails.

What email marketers say
11Marketer opinions

Internal emails may be flagged as impersonation even with SPF and DKIM verification for several reasons. Primarily, internal email systems or Microsoft 365 policies may have overly restrictive filters that flag emails from third-party providers as suspicious, especially if the provider isn't recognized as a legitimate sender. Incorrect SPF and DMARC configurations, such as DMARC policies set too strictly, can also cause emails to be rejected. A low domain or IP reputation can also trigger impersonation flags. Additionally, issues like email forwarding and multiple server hops can invalidate authentication. Starting authentication recently means reputation hasn't yet been established and can result in impersonation flags.

Key opinions

  • Restrictive Internal Filters: Internal email systems might have filters that flag emails from third-party providers as impersonation due to security concerns.
  • Incorrect DMARC Configuration: DMARC policies set to reject or quarantine emails can flag legitimate emails if they fail SPF or DKIM checks.
  • Low Domain/IP Reputation: A poor domain or IP reputation can lead to emails being flagged as impersonation, even with proper authentication.
  • SPF Forwarding Failures: Internal emails forwarded through external services may fail SPF checks if the forwarding server isn't authorized in the SPF record.
  • Email Hop Issues: Multiple server hops can invalidate SPF/DKIM results if servers modify email headers or content after authentication.

Key considerations

  • Review Internal Filters: Examine and adjust internal email policies and filtering rules to ensure they recognize and trust emails from your third-party provider.
  • Correct DMARC Policy: Ensure your DMARC policy is correctly configured and aligned with your email sending practices to avoid unintended rejections.
  • Improve Domain/IP Reputation: Consistently send high-quality emails and maintain low complaint rates to improve your domain/IP reputation.
  • Configure Forwarding: Properly configure your email servers to handle forwarded emails to prevent SPF failures.
  • Maintain Email Integrity: Ensure that all servers in the email path are configured to maintain the integrity of the email to prevent authentication invalidation.
  • Email Authentication Reputation: If you have only just started authenticating emails, ensure you warm up your IP and domain reputation by sending a consistent volume of emails.
Marketer view

Email marketer from EmailGeeks forum responds that internal email systems may flag emails from third-party providers as impersonation if the internal system is configured to treat all emails that originate outside of the organization's network as suspicious. Review your internal email system's configurations and adjust the settings to trust emails coming from your authenticated third-party provider.

September 2022 - EmailGeeks forum
Marketer view

Marketer from Email Geeks shares that if you’ve just now started authenticating your mail with SPF and DKIM and DMARC, this is the first that Google has seen mail that’s associated with these newly authenticating identifiers. These newly authenticated identifiers have not yet established any kind of reputation at Google, but they will establish a reputation over time as more and more mail associated with those authenticated identifiers is sent to Google. Once those reputations are established, then the authentication will ensure that you get the deliverability you deserve.

July 2023 - Email Geeks
Marketer view

Email marketer from StackExchange responds that internal emails forwarded through external services may fail SPF checks due to the forwarding server not being authorized in the SPF record. Configure your email servers to handle forwarded emails correctly to avoid this issue.

May 2022 - StackExchange
Marketer view

Email marketer from Mail Server Forum explains that the email message passing through multiple servers ('hops') can affect authentication results. If an email goes through a server that modifies the headers or content after SPF/DKIM validation, this can invalidate the authentication. It's important to ensure that all servers in the email path are configured to maintain the integrity of the email.

August 2024 - Mail Server Forum
Marketer view

Email marketer from Reddit answers that one reason emails are still flagged as impersonation even with SPF/DKIM set up is because of restrictive internal email policies and filtering rules. The receiving mail server may have strict rules in place to identify and flag emails as impersonation based on certain patterns or characteristics, regardless of the authentication protocols. You should adjust your filters.

August 2024 - Reddit
Marketer view

Email marketer from Reddit explains that a common issue in Office 365 is that the internal filtering settings are set to be very aggressive. Office 365's anti-phishing policies can sometimes misinterpret legitimate emails as phishing attempts, especially if they are coming from a third-party service. Review and adjust your Office 365 anti-phishing settings to allow emails from your third-party provider.

October 2021 - Reddit
Marketer view

Email marketer from Superuser answers internal emails can be marked as impersonation because the internal mail server sees the email coming from an external source (the third-party provider) that it doesn't recognize as a legitimate sender for your domain. The mail server uses anti-spoofing filters to detect and block these emails, considering them as potential phishing attempts.

January 2024 - Superuser
Marketer view

Email marketer from Mailjet shares that email deliverability problems can arise with SPF and DKIM if the IP address of the sending server isn't correctly added to the SPF record or if the DKIM signature is invalid. They also suggest that a mismatch between the 'From' address and the domain used to sign the email can trigger impersonation flags.

April 2022 - Mailjet
Marketer view

Email marketer from EmailDeliverabilityBlog shares that even with SPF and DKIM in place, your email domain or IP address might have a low reputation. Some internal systems flag emails from domains or IPs with a poor reputation, regardless of authentication. You can improve your reputation by consistently sending high-quality emails and ensuring low complaint rates.

November 2023 - EmailDeliverabilityBlog
Marketer view

Email marketer from Quora answers, if your emails are being flagged as impersonation, your internal policies or filtering rules might be too strict. This is often the case when dealing with external providers, as internal systems may not recognize them as valid senders. Review and adjust these policies to recognize and trust emails from your third-party provider.

August 2021 - Quora
Marketer view

Email marketer from EmailMarketingForum explains that a common problem is incorrect SPF and DMARC configuration. Even if SPF and DKIM are set up, DMARC policies can cause emails to be flagged if the DMARC policy is set to reject or quarantine emails that fail SPF or DKIM checks. Ensure that your DMARC policy is properly configured and that your third-party provider is aligned with your DMARC policy.

March 2021 - EmailMarketingForum

What the experts say
4Expert opinions

Internal emails can be flagged as impersonation even with SPF and DKIM due to several factors. Simple mail security setups often consider emails sent from a domain via a third-party provider to recipients within that same domain as impersonation. In addition, restrictive internal policies, particularly within enterprise environments, can override authentication protocols and flag emails based on sender patterns. Issues related to internal handoffs within email infrastructure like Messagelabs/Microsoft can also disrupt authentication. Furthermore, DMARC policies set too strictly (e.g., p=reject) can lead to the rejection of legitimate emails that fail authentication checks.

Key opinions

  • Simple Mail Security: Basic security configurations often flag emails sent from a domain via a third-party provider to recipients within the same domain as impersonation.
  • Restrictive Internal Policies: Enterprise environments and internal email systems may have policies that override authentication and flag emails based on sender patterns.
  • Internal Infrastructure Issues: Internal handoffs within email infrastructure (e.g., Messagelabs/Microsoft) can disrupt the authentication process.
  • Strict DMARC Policies: DMARC policies set too strictly (p=reject) can cause legitimate emails that fail authentication checks to be rejected.

Key considerations

  • Assess Security Setups: Evaluate whether basic security setups are overly restrictive and flagging legitimate emails as impersonation.
  • Review Internal Policies: Examine internal email policies to ensure they do not override authentication protocols and flag emails unnecessarily.
  • Investigate Infrastructure: Investigate and address any issues related to internal handoffs within your email infrastructure that may be disrupting authentication.
  • Adjust DMARC Policies: Review and adjust DMARC policies to ensure they are not overly strict and causing legitimate emails to be rejected.
Expert view

Expert from Email Geeks notes that the external authentication looks good, but there’s an internal handoff at messagelabs/Microsoft that’s breaking things, but is unsure how much of an issue that is.

October 2023 - Email Geeks
Expert view

Expert from SpamResource answers that emails from a 3rd party can be flagged even with SPF/DKIM, due to internal policies overriding authentication protocols. These policies identify emails as impersonation based on sender patterns, regardless of authentication. Review internal filters.

March 2024 - SpamResource
Expert view

Expert from Word to the Wise explains that DMARC, even with SPF and DKIM, can cause internal emails to be flagged if the DMARC policy is set too strictly (e.g., p=reject). This policy might instruct receiving servers to reject emails that appear to be from your domain but fail authentication, even if they're legitimate internal emails sent via a third-party provider. You should review your DMARC policy to ensure it is aligned with your email sending practices.

June 2023 - Word to the Wise
Expert view

Expert from Email Geeks explains that if you’re sending “from” your domain via an external 3rd party provider to recipients in that domain that’s exactly what simple mail security setups consider impersonation. He also suggests that the final answer might be that the "enterprise filter gonna enterprise filter".

March 2021 - Email Geeks

What the documentation says
3Technical articles

Even with SPF and DKIM verification, internal emails can be flagged as impersonation due to strict receiving mail server configurations or conflicting authentication settings within an organization, as highlighted by Microsoft Learn. Google Workspace Admin Help emphasizes that internal spoofing can arise from improper inbound mail authentication, necessitating correct setup of SPF, DKIM, and DMARC records, along with adjustments in the Google Admin console. DMARC.org adds that organizational policies not correctly configured for internal senders routed through external providers can lead to internal spoofing, underscoring the importance of properly configuring internal authentication.

Key findings

  • Strict Server Configuration: Receiving mail servers may have overly strict configurations that flag internal emails even with proper SPF and DKIM.
  • Conflicting Authentication: Conflicting email authentication settings within the organization's email environment can cause impersonation flags.
  • Improper Inbound Auth: Internal spoofing arises from improper inbound mail authentication.
  • Incorrect Organizational Policies: Organizational policies not correctly configured for internal senders routed via external providers can lead to spoofing.

Key considerations

  • Review Server Settings: Examine receiving mail server configurations for overly strict settings that may be flagging legitimate internal emails.
  • Resolve Authentication Conflicts: Identify and resolve any conflicting email authentication settings within the organization's email environment.
  • Setup Authentication Records: Properly set up SPF, DKIM, and DMARC records to ensure proper authentication of inbound mail.
  • Configure Policies: Correctly configure organizational policies to handle email from internal senders routed through external providers.
Technical article

Documentation from DMARC.org answers that internal spoofing can happen when organizational policies are not correctly configured to handle email from internal senders that are routed through external providers. It is important that your internal authentication configurations are correctly set up.

December 2023 - DMARC.org
Technical article

Documentation from Google Workspace Admin Help explains that internal spoofing can occur if inbound mail isn't properly authenticated. This documentation also explains how to make sure mail is authenticated, including setting up SPF, DKIM, and DMARC records, as well as adjusting settings for inbound mail in the Google Admin console to detect and manage spoofing attempts.

August 2023 - Google Workspace Admin Help
Technical article

Documentation from Microsoft Learn explains that even with SPF and DKIM configured correctly, internal emails can be flagged as impersonation if the receiving mail server's configuration is too strict or if there are conflicting email authentication settings within the organization's email environment.

January 2025 - Microsoft Learn