An email health check audits the technical foundation of your sending domain. It looks at MX records, SPF, DKIM, DMARC, BIMI, MTA-STS, TLS-RPT, CAA, and the domain’s blacklist and reputation status. Each one gets a score, the scores roll up into a single percentage, and every failed check returns the record value and the fix to apply. It’s the fastest one-shot deliverability audit you can run before a send.Documentation Index
Fetch the complete documentation index at: https://docs.spotzee.com/llms.txt
Use this file to discover all available pages before exploring further.
quick DKIM scope for ongoing monitoring, full for the first audit on a new domain.Why this matters
Email authentication is silent infrastructure until it breaks. SPF passes today, then a vendor change pushes the DNS lookup count past 10 and the record starts topermerror everywhere. DMARC reports go to a parsed-out address that nobody monitors. DKIM rotates, the new selector isn’t published, and signature checks start failing. The first signal you usually get is a deliverability complaint from sales, and by that point the reputation damage has already happened.
For regulated firms the stakes are higher. An unauthenticated message isn’t just a deliverability problem. It’s an audit-trail problem. Mailbox providers downgrade unauthenticated mail to spam, the customer never sees it, and the firm has no record of what was actually delivered. A scheduled email health check turns silent failure modes into something an oncall engineer can act on the same week.
There are three moments worth running the audit. Before each campaign on a domain you haven’t sent from this quarter. After any change to DNS, ESP routing, or DKIM key rotation. And on a fixed schedule. The first business day of each quarter is a defensible default for a marketing-comms compliance log.
How it works
The audit is a parallel sweep across nine DNS-level signal groups. The whole thing runs in a couple of seconds because every query is cached aggressively at every recursive resolver in the chain.Submit a domain
example.com or user@example.com. If there’s an @, the part after it becomes the domain. Everything else is treated as a bare domain.Resolve every authentication record
include: expansion), DMARC, DKIM (popular selectors in quick mode, a wider sweep in full mode), BIMI, MTA-STS policy file, TLS-RPT, and CAA. Each query has a fixed weight in the final score based on how strongly it influences inbox placement.Score each signal group
score and maxScore. Pass when score == maxScore. Partial when between zero and maxScore. Fail when zero. Buckets the upstream considers non-applicable (most often BIMI on a domain with no logo published) report maxScore: 0 and don’t drag the percentage down.Roll up the percentage
What to watch for in the result
Read the output in priority order. The cheapest fixes give the largest score lifts.- Final percentage and
dataCompleteness. IfdataCompleteness.percentageis below 100, your score has gaps. Fill the missing checks first. Incomplete data masks risk. - SPF lookup count. RFC 7208 caps SPF at 10 DNS lookups per evaluation. Anywhere near the cap, trim or flatten an
include:chain before itpermerrors. The audit returns the live count so you can see exactly how close you are. - DMARC policy direction.
p=noneis monitoring only. Receivers ignore alignment failures. Production sending domains should be onp=quarantineorp=rejectonce you trust your sender list. - DKIM selector coverage. Quick mode tests the most-used selectors. If your selectors are custom, switch to
fullmode and confirm the records the tool detected match what your provider actually signs with. - Domain blacklist status. A blacklisted domain or its mail-server IP is the first thing a receiver checks. One listing is recoverable. Multiple listings need urgent investigation.
- MTA-STS and TLS-RPT presence. Both are increasingly mandatory for finance senders. Receivers like Google, Microsoft, and Apple use them to enforce TLS for inbound mail.
How the score buckets weight
The scoring weights are fixed by the upstream service. They reflect how strongly each signal influences real inbox placement, not a guess at what’s “important”. The exact maxima vary slightly by domain (BIMI drops to zero when no logo is published, for example), but the relative weights are stable.| Bucket | Weight (approx) | Why it matters |
|---|---|---|
| MX | 30 points | Without MX, the domain can’t receive mail. The check verifies records, providers, backup hosts, blacklist status of every IP, and reverse-DNS alignment. |
| SPF | 80 points | Largest bucket. Catches the lookup-count cap, soft/hard fail qualifiers, recursive include:, void lookups, and mechanism breadth. |
| DKIM | 60 points | Quick mode tests popular selectors, full does a wider sweep. Missing or misaligned signatures are the second most common silent failure. |
| DMARC | 60 points | Policy direction (p= and sp=), rua/ruf reachability, pct, aspf, adkim alignment. |
| Domain | 50 points | Domain age, expiry, blacklist status, registrar, hosting, parked-domain detection, TLS/DNSSEC. |
| MTA-STS | 10 points | Policy file presence, mode (enforce vs testing), max_age, MX coverage. |
| TLS-RPT | 5 points | TLS reporting endpoint reachability. |
| CAA | 5 points | Authorised certificate issuers, incident-reporting contact, contact records. |
| BIMI | 0–5 points | Optional. Only contributes when a BIMI record is published. |
FAQs
What does an email health check actually audit?
What does an email health check actually audit?
How is this different from an email deliverability test?
How is this different from an email deliverability test?
What email health score is good enough?
What email health score is good enough?
Why does my SPF or DMARC pass syntactically but still fail in real sends?
Why does my SPF or DMARC pass syntactically but still fail in real sends?
permerror). A DMARC policy of p=none that receivers treat as monitoring only. And DKIM signatures that pass for the rotating selector but fail the alignment check (the From header domain doesn’t match the d= tag). The health check surfaces all three. The result panel highlights which is the active blocker.Should I run quick or full DKIM mode?
Should I run quick or full DKIM mode?
default, google, selector1, s1, mandrill, mailgun*, k1, and similar. It’s fast, low-cost, and catches every domain using a popular ESP. Full mode adds a sweep across less-common selectors and is worth running once on first audit so you know exactly which selectors a domain publishes. After the first full run, quick mode is fine for ongoing monitoring.Can I run the audit on a domain I don't own?
Can I run the audit on a domain I don't own?
How does this chain with the other email-validation tools?
How does this chain with the other email-validation tools?