Protection Playbook

Protection Guides

Step-by-step instructions for hardening your domain, responding to lookalike threats, and getting attacker infrastructure taken down.

Set up DMARC, SPF & DKIM

Prevent email spoofing from your domain. Critical when a lookalike domain has MX records.

Highest priority
The DMARC rollout playbook

From p=none to p=reject safely. The 3-phase escalation path with rua-driven gates between each step.

Playbook
File a Registrar Abuse Report

Report a lookalike domain to the registrar that sold it. Works for both inactive and active domains.

Report a Live Phishing Site

Get browsers to warn users about a live phishing site via Google Safe Browsing and Microsoft SmartScreen.

File a UDRP Complaint

Use ICANN's dispute resolution process to reclaim a domain registered in bad faith, without going to court.

Defensive Domain Registration

Register common typos and TLD variants of your domain before attackers do.

Proactive
Understanding Confidence Levels

How PhishFence determines if a lookalike domain is actively phishing, and how to prioritize your investigation.

Investigation