Sending DMARC compliant emails using WP Engine and SendGrid with OnDMARC’s Investigate feature

We know a lot of our customers use WordPress sites for their main online presence. We also know a lot of our customers want to send emails from those sites.  And that can be tricky to do.

WP Engine is one of the premium hosting platforms for WordPress sites but its main focus isn’t on sending large amounts of emails on behalf of its customers. This adds another layer of complication for anyone looking to get all their email sources, including a WordPress site, fully DMARC configured.

Such a scenario is exactly why we built our latest feature Investigate. It’s specifically designed to reduce the amount of time, effort, and confusion that can be involved in getting an email source configured correctly with your DMARC policy.

In this blog, we’ll be walking you through how we used Investigate to successfully set up a third-party sending system ‘SendGrid’ to send emails from our WordPress site and then fully customize it to send emails on behalf of our domain. Thus achieving DMARC compliance, hurrah!

Oh, and before we get into the nitty-gritty, if you’d like to learn more about our new Investigate feature then follow this link.

The basics

For this exercise we used the following:

  • Default site name: testdmarc 
  • Custom domain: nodmarc.com
  • OnDMARC Investigate inbox to test DMARC compliance: 639809cc@public.redsift.co

And the process we followed was:

  1. Sign up to WP Engine and test emails using default site domain
  2. Add custom site to WP Engine and test emails
  3. Sign up to SendGrid and add our custom domain
  4. Customize SendGrid to send emails on behalf of our domain and test emails

1. Sign up to WP Engine and test emails using default site domain

By default, emails sent from our WordPress site are sent via the WP Engine platform using the domain of wpengine.com. These emails are limited to notification emails such as password resets, and they pass DMARC validation by default as we will show below.

Once we signed up to WP Engine and accessed the default site we added 639809cc@public.redsift.co as an additional user for testing purposes. This inbox will receive notification/test emails and display the SPF, DKIM and DMARC results as well as TLS and FcRDNS results but for the purpose of this exercise, we will only focus on DMARC.

After adding our Investigate inbox as an additional user we changed the password of our site to trigger a notification email to be sent to it. The results displayed were as follows:

Investigate clearly shows the email passed DMARC validation and that the domain used throughout, by default, was wpengine.com

Within Investigate the authentication results for the password reset email from WP engine are clearly shown. 
The Investigate summary shows the status of the DMARC alignment check

2. Add custom site to WP Engine and test emails

Next we added nodmarc.com as our primary domain to WP Engine and created an A record for it in DNS so that our site can be accessed using this domain name.

Once the DNS changes have propagated we went into the settings of our WordPress site and changed the address to point to our new one as shown below.

Now we now changed the password again to trigger a new notification email and see the results.

From the above, we can see that notification emails are now sent using  the nodmarc.com domain and are not compliant. Going into the email reveals that this email is failing the DMARC alignment check.

Investigate clearly shows the cause of DMARC failure.

DMARC alignment requires that the From domain matches either the SPF or DKIM signing domain. They can also be subdomains of each other, however, in the above case the SPF and DKIM domains are completely different from the From domain.

As we will be using SendGrid to send emails we will not worry about this misalignment at the moment and go ahead and sign up to SendGrid.  

3. Sign up to Sendgrid and add our custom domain

After signing up to SendGrid and adding our custom domain we installed the SendGrid plugin to our WordPress site so we can connect and send emails via SendGrid. Connecting the plugin with SendGrid requires that you create an API key in SendGrid and paste it into the plugin as shown below.

Once successfully connected any notification emails will be sent via SendGrid using the Sending Address that we configured above. Sending a test email to our Investigate inbox now yields the following results.

Almost there… 

We can now see that whilst the emails are originating from SendGrid they fail DMARC alignment. The next step is to fix the DMARC alignment.

4. Customize SendGrid to send emails on behalf of our domain and test emails

To achieve DMARC compliance we will have to turn on and configure Sender Authentication in SendGrid. This requires us to create the following records in our DNS.

Once verified SendGrid will customize the domain used by SPF and DKIM to match nodmarc.com. To verify this we sent another test email from our Sendgrid plugin. The results were as follows.

Green ticks all round!

We can see from the above that Sendgrid has been configured correctly and DMARC passes. We are now well on our way to full DMARC protection and by having DMARC properly configured we are not risking any legitimate emails from Sendgrid being rejected.

Start your free ONDMARC trial today

Interested in getting DMARC set up easily and quickly for your business? Start your free 14-day trial today!

free trial red sift

PUBLISHED BY

Ivan Kovachev

26 Nov. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more