Overview
In order to prevent emails sent from customized campaign From Email Addresses from going into SPAM, your institution DNS may need to be configured by your institution's IT staff.
Configure SPF
Add an SPF record to your DNS provider with the following content:
"v=spf1 include:amazonses.com ~all"
If you already have an SPF record, you can update it as follows:
"v=spf1 include:example.com include:amazonses.com ~all"
(where example.com are your existing trusted domain(s)).
This will allow the SS&E mail servers (Amazon SES) to send authenticated mail.
Note: This does not allow Amazon to send emails on your behalf, and only those email addresses which have been explicitly verified can be used.
Configure SPF - Dedicated sender IP addresses
Your institution may not want or be able to trust the enter amazonses.com domain.
You may instead trust the SS&E leased IP addresses. No other entity can send mail from these IP addresses: 54.240.44.160 and 54.240.44.159.
To use these addresses, you may create your SPF record as follows:
"v=spf1 ip4:54.240.44.159 ip4:54.240.44.160 ~all"
Verify your DMARC settings
If your institution uses DMARC to prevent email spoofing, ensure that it is in relaxed SPF mode.
To check the current mode, you can run:
nslookup -type=TXT _dmarc.example.com
(you may need to install nslookup).
Verify that the strings aspf=r and aspf do not appear. If they do, remove those tags from your DMARC DNS record.