Next, you need to set up the DNS records or your emails won't work properly.
If your domain doesn't use SPF, receiving mail servers can't verify that messages that appear to be from your domain actually are from you.
Without DMARC, hackers and other malicious users can impersonate messages, making them appear to come from your organization or domain. Turning off DMARC puts your users and your contacts at risk for spam, spoofing, and phishing.
DKIM helps receiving email servers verify that messages are actually from the organization shown in the email. When servers can verify that messages are from your organization, they're less likely to mark them as spam.
The records for these will be the same for every domain, so you can copy and paste the same host/name, type and value for each.
SPF (Sender Policy Framework)
The SPF record allows only Office 365's mail servers to send emails for your domain.
TXT Record for SPF:
Host/Name: @
Type: TXT
Value: v=spf1 include:spf.protection.outlook.com -all
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
A basic DMARC record to monitor email authentication.
TXT Record for DMARC:
Host/Name: _dmarc.try1000xleads.com
Type: TXT
Value: v=DMARC1; p=none
Unfortunately, the records for DKIM will all be different. You will need to go into the Microsoft Security Admin, generate the records, and add them. This is time-consuming but must be done.
There will be two CNAME records for each domain. They will look something like:
Host/Name: selector1._domainkey.try1000xleads.com
Type: CNAME
Value: selector1-try1000xleads-com._domainkey.yourdomain.onmicrosoft.com
Host/Name: selector2._domainkey.try1000xleads.com
Type: CNAME
Value: selector2-try1000xleads-com._domainkey.yourdomain.onmicrosoft.com
*Do not use those. Those are examples only of mine. They won't work for you
Watch This Video: https://www.loom.com/share/accff8c80b9f4529bdf54245a7c061a4?sid=9d5720d1-400b-491e-a3b4-5f620ce52cb5
Add DKIM, DMARC and SPF To All DNS Records - Month 1 · 10k Per Month Agency