How to setup DKIM, SPF, DMARC, BIMI to reduce Mailchimp spam issues

Improve Mailchimp email delivery with a step-by-step guide: configure DKIM, SPF, DMARC, and BIMI for reliable inbox placement!

Othman Katim
Email Marketing Expert
Sep 2025
X
Some spam issues ?
Mailwarm keeps your emails away from spam.
See More

What you need before you start

  • Access to your domain’s DNS host (usually your domain registrar or DNS provider).
  • A verified sending domain in Mailchimp with admin-level permissions.
  • The ability to add TXT, CNAME, and possibly to host SVG files for BIMI.
  • An email inbox or dedicated alias for receiving DMARC reports.
  • Your brand logo in SVG Tiny P/S format for BIMI, along with a Verified Mark Certificate (VMC) if required.
  • Time for DNS changes to propagate (ranges from minutes to 24–48 hours).

Keep a detailed record of every change you make. And remember: use only one SPF record per domain. The importance of this will be clear as we address DKIM, SPF, DMARC, BIMI Mailchimp spam issues in a logical, organized sequence.

Step 1: Verify your domain in Mailchimp and assess your DNS

Purpose: Ensure Mailchimp recognizes your domain and gather the exact DNS records Mailchimp requires. This step eliminates guesswork and reduces mistakes that could disrupt authentication.

Within Mailchimp, open your domain settings and select the domain you plan to use for sending. Begin the authentication process; Mailchimp will provide the required values for SPF and DKIM, typically one SPF include statement and two DKIM CNAMEs. Carefully copy these values as they appear. Do not alter or improvise DNS record syntax; precise input is essential to properly address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Next, review your DNS records. List all existing TXT records for both the root and any “mail” subdomains. Identify any existing SPF, DMARC, or DKIM records. If an SPF record already exists, you will integrate Mailchimp’s include into it. For any outdated DKIM CNAMEs or obsolete DMARC policies, determine whether to update or remove them. This careful audit helps prevent conflicts and speeds up positive results as you address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Step 2: Publish a single SPF record including Mailchimp

Purpose: Grant Mailchimp permission to send email on your behalf so that receivers do not mark your emails as forged.

SPF is published as a single TXT record at your root domain (or whichever domain is in the From address). It begins with v=spf1 and ends with a qualifier, such as ~all or -all. If an SPF record already exists for your domain, do not create a second one. Merge Mailchimp’s “include” directive into your current SPF record. In most cases, Mailchimp supplies an include like: include:servers.mcsv.net. Always copy exactly what’s displayed in your Mailchimp dashboard. This correct merging ensures a seamless setup and helps you cleanly address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Be aware of the 10-DNS-lookup limit in SPF. This means that the SPF parser follows a maximum of 10 domain names specified in an SPF record. Each include: triggers DNS lookups; if you use several services, consider “flattening” your SPF at build time or consolidating providers. For detailed syntax advice and more about edge cases, see our guide on SPF strategies across Google, Microsoft, and multi-domain setups. After publishing the revised record, allow for propagation and verify accuracy with a DNS checker. This diligence prevents disruptions as you address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Example SPF (illustrative only, always use values provided by Mailchimp):
v=spf1 include:servers.mcsv.net include:_spf.google.com ~all

Step 3: Add Mailchimp’s DKIM CNAME records

Purpose: Enable Mailchimp to cryptographically sign your email, proving its integrity and domain alignment for recipients.

Mailchimp will usually provide two DKIM CNAME entries, typically in the form of selectors such as k1._domainkey and k2._domainkey, pointing to Mailchimp-owned targets. Enter them exactly as provided. Do not change these CNAMEs to TXT records unless Mailchimp specifically instructs you. Typos in either the host or target can break DKIM validation and halt your effort to address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

After publishing, wait for DNS to propagate, then send a test email from Mailchimp to an inbox you control. Inspect the full headers to confirm a DKIM=pass status and matching d= value for your domain. Passed tests confirm strong domain identity, while failures often stem from misconfigurations (such as misplaced dots or incorrect DNS zones).

Step 4: Implement DMARC with monitoring, then increase enforcement

Purpose: Instruct receiving servers on how to handle mail that fails SPF and DKIM, and request reports to monitor authentication alignment.

Begin with a monitoring policy by publishing a TXT record at _dmarc.yourdomain.com with p=none and a reporting address (rua). Point rua= to an address or reporting service you will monitor. This approach provides insight into authentication without affecting delivery at the outset, helping you fine-tune alignment as you address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Example DMARC record (illustrative):
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; fo=1; adkim=s; aspf=s; pct=100

After two to four weeks of clear DMARC reports, consider raising your policy to p=quarantine, and eventually to p=reject once all legitimate email sources align with your policy. Use strict alignment (adkim=s and aspf=s) if you require tight control. Do not rush to full rejection while any legitimate system still sends unauthenticated mail, as this could inadvertently impact important communications. This gradual strategy is essential for maintaining your reputation and financial security.

Step 5: Prepare BIMI to display your brand logo

Purpose: Enable your authenticated email to display your verified brand logo in supported inboxes, increasing trust and reducing phishing confusion.

BIMI requires a strong DMARC policy (typically p=quarantine or p=reject) and your logo in SVG Tiny P/S format. Many providers, including Gmail, also require a Verified Mark Certificate (VMC). Host your SVG file publicly via HTTPS and publish a TXT record at default._bimi.yourdomain.com pointing to your logo’s URL. If you have a VMC, include its certificate URL as well. This visual branding builds trust and supports your goal to address DKIM, SPF, DMARC, BIMI Mailchimp spam issues.

Make sure your SVG complies with the SVG Tiny P/S specification. Remove unnecessary scripts, gradients, and external resources. Ensure the file size of your SVG does not exceed a reasonable upper limit (e.g., 50KB) to optimize compatibility and load speed. Once live, send test messages to inboxes that support BIMI to check for logo rendering. While not all providers support BIMI immediately, this discipline reinforces strong domain alignment with your Mailchimp's email authentication.

Step 6: Test, monitor, and gradually warm up your sending domain

Purpose: Verify correct authentication across providers, monitor for configuration drift, and establish a positive sending reputation.

Perform header analysis on test messages sent to different providers. Confirm that SPF=pass, DKIM=pass, and DMARC=pass all align with your domain. Regularly run DNS and authentication checks (at least weekly). Monitor DMARC aggregate reports and promptly resolve any unexpected sources of failure. This ongoing vigilance helps you catch issues before they grow.

Mailbox providers also score recent sender activity, such as engagement and complaint rates. Gradually ramp up your sending volume, especially if your domain is new or has been inactive. Automated warm-up tools help build legitimate interactions, such as opens, replies, and spam-flag removals, providing additional support as you scale. Pair strong authentication with monitored warmup for a stable sending environment and fewer spam-folder detours. For deeper insight into mailbox rules and filtering behavior, revisit linked resources and your DMARC data.

Troubleshooting and alternative solutions

Even with thorough setup, some issues or inconsistent inbox placement can arise. Here are frequent problems and how to address them as you deal with DKIM, SPF, DMARC, BIMI Mailchimp spam issues:

  • Two SPF records: Merge all includes into a single record. Multiple SPF records will cause SPF failures.
  • SPF lookup limit exceeded: Reduce the number of includes or flatten your SPF record to remain within the lookup cap.
  • DKIM CNAME at the wrong DNS level: Ensure selectors are published under _domainkey for your sending domain.
  • DMARC alignment failures: Match the d= value in DKIM and the domain in the From address. Align SPF's Mail From domain as well.
  • Strict vs. relaxed alignment: If trusted third parties send on your behalf using subdomains, consider relaxed alignment temporarily while you complete your inventory.
  • BIMI logo not displaying: Confirm VMC requirements, SVG Tiny P/S compliance, and that your DMARC policy is set to quarantine or reject.

If your SPF record is overly complex, consider moving high-volume senders to subdomains (for example, use news.yourdomain.com for newsletters and reserve yourdomain.com for critical communications). This isolates reputation issues and simplifies record maintenance.

If you continue to experience soft bounces or persistent spam-folder placement after careful configuration, review other factors like your domain’s reputation or recent sending history. New or infrequently used domains require a gradual ramp-up period. Assess your message content for common spam triggers, but avoid drastic redesigns while DNS changes are propagating. When in doubt, consult a deliverability specialist and provide your DMARC reports and full email headers for expert review.

Conclusion

You have now followed a structured process to authenticate your Mailchimp-sending domain: verify your domain, maintain a single, accurate SPF record, add DKIM CNAME records, implement DMARC with incremental enforcement, and enable BIMI for enhanced brand trust. Continue to test, monitor, and build engagement gradually. By maintaining this sequence, you will reliably address DKIM, SPF, DMARC, BIMI Mailchimp spam issues and minimize future disruptions.

If you're seeking expert input for your authentication, reporting, or warm-up strategies, reach out to seasoned deliverability professionals. Share your domain, email headers, and delivery goals, and receive a clear action plan tailored to your email service infrastructure. Start a conversation with mailadept and move forward with confidence.

FAQ

What is the main reason emails from Mailchimp end up in spam?

Emails from Mailchimp often land in the spam folder due to missing or incorrectly configured email authentication records like DKIM, SPF, DMARC, and BIMI.

What DNS records do I need to configure for Mailchimp?

To improve email deliverability with Mailchimp, you need to configure DKIM, SPF, DMARC, and BIMI DNS records correctly.

What is the purpose of DKIM records?

DKIM records allow Mailchimp to add a digital signature to your emails, proving their authenticity and ensuring they haven't been tampered with.

Why is it important to have only one SPF record?

Having a single SPF record is important because having multiple can cause authentication failures, which negatively affect email deliverability.

What does a DMARC policy do?

A DMARC policy guides email servers on how to handle emails that fail SPF and DKIM checks and helps you receive reports on emails sent from your domain.

How can BIMI benefit my email marketing?

BIMI allows your email to display your brand logo in supported inboxes, building trust and reducing the risk of phishing.

What should I do if I see DMARC alignment failures?

If you encounter DMARC alignment failures, ensure that the domains in your DKIM signature and SPF record match the domain in the From address.