If your users are receiving emails that appear to be sent by themselves, it's possible that their email accounts have been compromised or that the emails are being spoofed. To help mitigate this issue, you can implement certain rules in cPanel/WHM to reduce the likelihood of such emails reaching your users' inboxes. Here are a few suggestions:
1. Implement SPF (Sender Policy Framework): By configuring SPF records for your domain, you can specify the authorized mail servers that are allowed to send emails on behalf of your domain. This helps prevent spoofed emails from being delivered to your users.
2. Enable DKIM (DomainKeys Identified Mail): DKIM is another email authentication method that adds a digital signature to outgoing emails. This signature is used to verify that the email hasn't been modified in transit and that it originates from an authorized source. You can usually find DKIM settings in the "Email Deliverability" or "Email Authentication" section of cPanel/WHM.
3. Enable DMARC (Domain-based Message Authentication, Reporting, and Conformance): DMARC combines SPF and DKIM to provide a comprehensive email authentication solution. It allows you to define policies for how receiving mail servers should handle emails that fail authentication checks. By implementing DMARC, you can specify whether such emails should be delivered, quarantined, or rejected.
4. Implement stricter email filtering rules: You can configure email filters in cPanel/WHM to detect and block suspicious emails. Create rules that analyze the email headers, subject lines, and content for signs of spoofing or suspicious activity. For example, you can create rules that check if the sender's email address matches the recipient's email address or if the email originates from an unrecognized IP address.
It's important to note that implementing these rules can help reduce the impact of spoofed emails, but they may not completely eliminate them. It's always a good idea to educate your users about email security best practices, such as avoiding clicking on suspicious links or attachments and regularly updating their account passwords. Additionally, consider reaching out to your hosting provider or system administrator
for further assistance in securing your email infrastructure.