Do not fail to perform the monitoring phase or incorrectly configure SPF and DKIM. That is why the reject policy can have a negative impact if used before the appearance of suspect emails. Daily supervision and small policy adjustments show that security is strong without immediately stopping the companies’ activities.
