arrow_back Back to Blog
MSP Best Practices February 22, 2026 · 9 min read

How MSP-Managed Domains, DNS, and DMARC Protect Your Clients

Most clients don't think about their domain until something breaks. That's exactly why an MSP should be managing it before anything goes wrong — because when it does, the window to respond is measured in hours, not days.


The client's blind spot

For most small and mid-size businesses, domains, DNS, and email authentication are invisible infrastructure. They register a domain, point it at something, and forget about it. A few years go by. Staff turn over. The person who set up the original registrar account has moved on. Nobody is sure whose card is on file for renewals. The DMARC record, if there is one, was added during an IT project that wrapped up eighteen months ago and hasn't been touched since.

That's not negligence — it's a natural result of clients focusing on their own business rather than their infrastructure. But it creates a quiet accumulation of risk. And when something exploits that risk, the damage tends to be immediate and highly visible: email stops delivering, a domain goes dark, or clients' customers start receiving phishing emails that look like they came from your client's domain.

An MSP that actively manages DNS, domains, and DMARC closes that gap. Not because the client asked for it specifically, but because it's part of the infrastructure that everything else depends on.

Domain security: more fragile than it looks

A domain is more than an address. It's the root of trust for email, the website, any SaaS tools verified against it, and — increasingly — digital identity for the business. Losing control of a domain, even temporarily, can cascade across every one of those systems simultaneously.

Domain hijacking is a real and underreported threat. It typically happens through one of three routes: compromised registrar credentials, a successful transfer initiated via social engineering, or an expired domain that gets scooped up before anyone notices. Each of these is preventable.

What MSP-managed domain security looks like in practice:

  • lock Transfer locks are on by default. No domain moves without an explicit MSP action.
  • notifications_active Expiry alerts fire at 60, 30, and 14 days — before auto-renew can silently fail.
  • manage_accounts Registrar credentials live in the MSP's secure platform, not in an employee's personal email inbox.
  • history Every change — DNS records, contact updates, nameserver modifications — is logged with a timestamp and user.

These basic controls eliminate the most common failure modes. A client who has managed their own domain registration at a consumer registrar is almost certainly missing at least two of them.

DNS: the layer everything else relies on

DNS misconfiguration is one of the most common causes of outages that clients attribute to something else entirely. Email goes down — "the email server must be broken." The website stops loading — "the hosting must have gone offline." A third-party integration stops working — "something changed on their end." In each case, the actual culprit is often a DNS record that was edited incorrectly, deleted by accident, or never updated after a migration.

When an MSP manages DNS, they bring consistency and accountability to a layer of infrastructure that clients have no practical way to audit themselves. They know which records exist, what they point to, and when they were last changed. That kind of visibility is the difference between diagnosing an outage in ten minutes and spending three hours eliminating possibilities.

There's also an operational risk dimension. Many business-critical services — Microsoft 365, Google Workspace, Stripe, Salesforce, and dozens of others — require DNS verification records to function correctly. These records need to be maintained as services are added, migrated, or cancelled. When the client manages their own DNS, those records often accumulate without review, creating a zone full of stale entries pointing to services the business stopped using years ago.

A scenario worth thinking through:

A client lets go of a SaaS vendor but forgets to remove the CNAME record that points a subdomain at that vendor's platform. Eighteen months later, the vendor is acquired and changes their infrastructure. The subdomain now resolves to an error page — or, worse, a page controlled by whoever claimed that hostname. A subdomain takeover via an abandoned CNAME is a real attack vector. An MSP with a clean, reviewed DNS zone would have removed that record on offboarding.

DMARC: the difference between monitoring and actual protection

DMARC is frequently misunderstood as something you either have or don't have. In reality, a DMARC record can be in three states: monitoring only (p=none), quarantine (p=quarantine), or full rejection (p=reject). A monitoring-only policy produces reports but takes no action — which means email spoofed from your client's domain lands in inboxes without any technical resistance.

Most clients who have a DMARC record at all are stuck on p=none. It was added to satisfy a compliance checklist, nobody moved it to enforcement, and now it quietly does nothing while the reports pile up unread. For a client in professional services or finance, this is a significant exposure — their domain can be used to send convincing phishing emails to their own customers without any authentication barrier.

An MSP that owns DMARC management doesn't just set a record and walk away. They monitor the aggregate reports to understand which mail streams are sending on the client's behalf, ensure that SPF and DKIM are aligned for all legitimate sources, and then move the policy to enforcement once it's safe to do so. That process typically takes a few weeks to a few months, depending on the complexity of the client's email stack — and it can only happen if someone is actually reading the reports.

The three things DMARC enforcement actually prevents:

  • phishing Domain spoofing — Attackers sending email that appears to come from your client's domain to their customers, partners, or staff.
  • email Business email compromise (BEC) — Fraudulent invoices or payment instruction changes sent in the client's name, bypassing spam filters because the domain looks legitimate.
  • shield Reputational damage — If spoofed emails are reported en masse, the client's domain can end up on blocklists, affecting the deliverability of their own legitimate email.

None of that protection exists at p=none. Moving to enforcement is the job — and it's a job that requires the MSP to have visibility into both the DNS zone and the DMARC reporting stream at the same time.

Faster incident response when the MSP already owns the infrastructure

When something goes wrong — a domain is hijacked, email starts bouncing, a phishing campaign is detected using a client's domain — the first question is always: who has access to fix it? If the answer is "the client, via a consumer registrar account we don't have credentials for," the incident response starts with an access problem before it even starts with the technical problem.

When the MSP manages the domain and DNS, that first hour looks completely different. The MSP already has full access. They can immediately lock the domain, roll back DNS changes, modify the DMARC policy, and issue alerts — all without waiting for a client to find credentials or navigate an unfamiliar registrar portal under pressure. Time-to-mitigation is shorter, and the client's exposure window narrows accordingly.

That speed matters more than it might seem. A spoofed email campaign running for six hours reaches far more of a client's contacts than one that's stopped in thirty minutes. A domain that's down for four hours costs more in operational disruption than one that comes back in forty minutes. The MSP's ability to act immediately is itself a measurable protection benefit.

Continuity through staff changes

One of the less visible risks in client-managed infrastructure is the single-person dependency. The domain is registered with a personal email account. The DNS records were set up by a contractor who's no longer engaged. The DMARC policy change was made by someone who joined the technical team three years ago and left eight months after. Nobody documented any of it.

When an MSP owns the domain management relationship, that dependency doesn't exist. The knowledge lives in the platform and in the MSP's team, not in someone's head or inbox. A client can onboard new staff, change IT vendors, or restructure their internal team without any of it creating a gap in their domain or email security posture.

This is particularly relevant at renewal time. Consumer registrar accounts often have a single credit card on file and renewal notices sent to a single email address. When that email address is a personal account or a former employee's mailbox, the renewal notice disappears. The domain expires. The client finds out when their website goes down or their email stops delivering. MSP-managed renewals centralise that risk and eliminate the dependency on any one person.

Compliance and audit readiness

For clients in regulated industries — legal, financial services, healthcare, insurance — demonstrating control over email security infrastructure is increasingly a compliance requirement rather than a best practice. DMARC enforcement, SPF alignment, DKIM signing, and domain ownership records may all be subject to review in an audit or supplier security assessment.

When an MSP manages these proactively, the client has something meaningful to show: a documented policy, an active monitoring setup, and an audit log of changes. That's a very different position than "we have a DMARC record, we think — let me find the person who set it up."

The MSP's ability to produce change history, current record states, and policy configurations on demand is a concrete compliance deliverable. It reduces the client's audit preparation burden and, in some cases, can satisfy requirements that would otherwise require a separate internal security process.

Why clients don't ask for this — and why MSPs should offer it anyway

Clients rarely walk into an MSP engagement and ask for domain management. They ask for IT support, network management, security monitoring — the things they can see and feel. DNS and DMARC are abstract until they fail, and by then the conversation is about recovery rather than prevention.

That's exactly why MSPs should include it as a standard part of the service rather than an add-on. The client who asks you to manage their Microsoft 365 environment is also depending on their DNS zone being correct for that to work. The client who wants you to improve their security posture is leaving a significant gap open if their DMARC policy is sitting at monitor-only. These aren't separate workstreams — they're the same infrastructure.

Proactively owning domain and DNS management deepens the MSP relationship in a way that's hard to replicate. When you're the entity that controls the domain, manages DNS, and actively enforces DMARC, switching away from your practice is a significant project — not because you've made it artificially difficult, but because you've built genuine, well-managed dependencies that the client would rightfully be cautious about unwinding.

What being proactive actually signals to a client:

When an MSP flags a p=none DMARC policy and proposes a path to enforcement before the client has experienced a spoofing incident, that's not upselling — that's the MSP doing their job. Clients notice the difference between being sold things and being protected from things. The latter builds the kind of trust that produces long-term relationships and referrals.

Related reading

Explore Albaspot features: Domain registration, DNS management, DMARC & email security, monitoring & alerting, MSP access control.


Manage domains, DNS, and DMARC for all your clients in one place

Albaspot is built for MSPs that want to manage their clients' domain and email security infrastructure properly — with full visibility, audit logs, and proactive alerting. Try it free.

Start free trial arrow_forward