Shonna King domain health audit report.
A domain health, email authentication, and web availability assessment for shonnaking.com. The report turns public DNS and mail-health findings into a clear remediation plan.
Executive Summary
The sample domain health scan returned 13 problems: 6 errors and 7 warnings, against 416 passing checks. On review, those items collapse into three root causes: a public website availability failure, missing DMARC, and several Google MX warning items that are best documented as known noise.
Reputation is clean, DNS fundamentals are mostly sound, and inbound mail is delegated to Google Workspace. The fastest remediation path is to restore the website, publish SPF/DMARC, verify DKIM signing, and then move DMARC from monitoring to enforcement.
Current-State Flow
The public-facing paths separate into three lanes: inbound mail, outbound authentication, and web traffic. Inbound delivery routes to Google Workspace; outbound trust is weakened by missing DMARC; web visitors hit an active availability failure.
Figure 1 — Simplified current-state flow for shonnaking.com.
Findings & Recommended Actions
Public website returns HTTP 530
The domain is reachable at the DNS layer, but the origin web server is not serving the public site. Visitors see an error instead of the business presence.
No DMARC record is published
Without DMARC, the domain is easier to spoof and mailbox providers have less trust in outbound messages.
Host: _dmarc.shonnaking.com Type: TXT Value: v=DMARC1; p=none; rua=mailto:dmarc-reports@shonnaking.com; fo=1
Confirm SPF is published and complete
Because mail is delegated to Google Workspace, root TXT records should authorize Google to send.
Host: shonnaking.com Type: TXT Value: v=spf1 include:_spf.google.com ~all
Verify DKIM signing in Google Workspace
Before moving DMARC to enforcement, generate the Google DKIM key, publish the TXT record, and enable signing.
SOA expire value is cosmetic
Adjust the DNS SOA expire value during routine DNS cleanup; this is not the priority compared to website and email authentication.
Google MX rDNS/banner warnings are known noise
These warnings reference Google inbound mail servers, not client-controlled hosts. Document them so they are not treated as repeat remediation items.