LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG
  2. 4. Mail Settings

4.3 Sender Domain

📖 Overview

The Sender Domain module empowers administrators to manage trust decisions for email senders based on their domain or full email address. This includes manual allow/block actions, as well as enforcement of SPF (Sender Policy Framework) validation outcomes.

It’s your front line for rejecting spoofed messages, phishing attempts, and untrusted senders before they even reach the user.

🛡️ This is where you take control of who is allowed to deliver email into your system — and who is not.


📂 Module Sections

This module includes two primary areas:


✅ Domain/Email Filter Settings

Purpose: Manually block or allow senders by domain or full email address.

Field
Description

Domain/Email

Enter a domain (e.g., example.com) or full address (e.g., name@example.com)

Status

BLOCKED or ALLOWED

Date Added

When the filter was applied

Actions

Delete / Modify

Use Cases:

  • Block spam or phishing domains that bypass filters

  • Whitelist trusted partners that were mistakenly flagged

  • Pre-authorize known safe mail sources

🎛️ This section offers immediate enforcement and overrides engine-based verdicts.


🔐 SPF Settings

Purpose: Define how the system handles different SPF validation outcomes for inbound mail.

SPF (Sender Policy Framework) helps verify whether a domain is authorized to send on behalf of its claimed source. ShieldsGuard supports rule-based enforcement of SPF failures.


✅ SPF Validation States & Configuration Options

State
Description
Available Actions

Failed

SPF failed — sender is not listed in domain's DNS; usually spoofed or unauthorized

Reject / Quarantine / Tag / Notify

Suspicious Delivery

Appears sent from unauthorized source but not 100% failed

Allow or Tag with warning

Unverified Source

SPF exists but is incomplete — cannot verify sender

Deliver or Quarantine

No Record

Domain has no SPF record at all

Deliver or Reject

Invalid Record

SPF is misconfigured or malformed — cannot validate

Deliver with tag or drop

Temporary Error

DNS/SPF server unreachable during validation

Deliver with caution

Each status has configurable policies:

  • ✅ Action (Deliver / Drop / Quarantine / Tag)

  • 🏷️ Add custom tags (e.g., spf-failure)

  • 📬 Send alert or notification to admin/SOC


🔧 Example SPF Use Case:

If a phishing message arrives from bank-login.com and the SPF check fails:

  • ShieldsGuard tags the email with SPF: failure

  • Admin sets action to “Drop email”

  • The message never reaches the inbox


📊 Why It Matters

  • SPF filtering prevents sender spoofing

  • Domain-level blocking minimizes threat exposure

  • You can enforce zero-trust mail sourcing across the org

  • Protects employees from impersonation (e.g., fake CEO, HR, finance requests)


✅ Best Practices

Practice
Recommendation

Always drop SPF “FAIL” messages

Prevents spoofed domain abuse

Review “No Record” cases manually

Avoid blocking legitimate but misconfigured domains

Use sender whitelist sparingly

Never allow overly broad or suspicious domains

Enable tagging for “Suspicious”

Improve user and SOC visibility


🎯 With Sender Domain control and SPF enforcement, you build a trustworthy perimeter for your inbox — rejecting impersonation, spam, and misconfigured infrastructure before it causes harm.

Previous4.2 Mail Body

Last updated 9 days ago