A curated list of awesome resources related to enhancing your enterprise Email Security. learn about email security protocols and best practices. Contributions are welcome!
- Email Authentication
- Email Filtering
- Email Encryption
- Phishing Protection
- Tools
- Reading
- Code of Conduct
- About
- SPF Introduction - SPF Explanation by PowerDMARC.
- SPF Introduction - SPF Explanation by Dmarcian.
- SPF Record Setup - SPF Record Setup by PowerDMARC.
- SPF Macros - SPF Macro Explanation.
- DKIM Technical Details - Technical Deep Dive on DKIM.
- DKIM record Configuration - Configuring a DKIM record.
- DMARC Introduction - An introductory explanation of DMARC and how it works.
- DMARC Explanation - Good DMARC alignment explanation.
- BIMI Complete Guide - BIMI Introduction and Complete guide.
- BIMI Implementation Guide - BIMI Group Implementation guide.
- MTA-STS Introduction and Implementation - A guide on MTA-STS by PowerDMARC.
- Email Filtering Concepts - Introduction to email filtering concepts and different types of spam filtering.
- Exchange Online Email Filtering - Exchange Online Email Filtering details.
- List of extensions to block:
.exe
,.bat
,.cmd
, etc.
- STARTTLS - An Explainer for STARTTLS and Opportunistic TLS vs Forced TLS.
- Email Transport Encryption Protocols - Explains the difference between STARTTLS, DANE, MTA-STS.
- S/MIME Introduction - S/MIME Introduction.
- Introduction to Open PGP - Open PGP Intro.
- Sublime Rules - Sublime Security Open Source Detection Rules.
- Phishing Detection Keywords - Phishing Detection Keywords to check for.
- Microsoft MHA - Microsoft Email Header Analysis.
- Mxtoolbox MHA - MxToolBox Email Header Analyzer.
- CyberDefenders MHA - Excellent Email Header Analyzer that can be deployed locally.
- Mxtoolbox DMARC Report Analyzer - MxToolBox DMARC Report Analyzer.
- OpenSource DMARC Report Analyzer - Open Source DMARC Report Analyzer.
- DMARC Record Analyzer - CISA SPF/DMARC Record Analyzer.
- DMARC Report Parser - DMARC Report Parser.
- ThePhish - ThePhish is an automated phishing email analysis tool based on TheHive, Cortex, and MISP.
- Email Security: Attack and Defense - A book on Email Security.
In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to make participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.
Examples of behavior that contributes to creating a positive environment include:
- Using welcoming and inclusive language.
- Being respectful of differing viewpoints and experiences.
- Gracefully accepting constructive criticism.
- Focusing on what is best for the community.
- Showing empathy towards other community members.
Examples of unacceptable behavior by participants include:
- The use of sexualized language or imagery and unwelcome sexual attention or advances.
- Trolling, insulting/derogatory comments, and personal or political attacks.
- Public or private harassment.
- Publishing others' private information, such as a physical or electronic address, without explicit permission.
- Other conduct which could reasonably be considered inappropriate in a professional setting.
Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.
Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.
This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at [email protected]. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.