TLS-RPT Record Explained: Why Email TLS Reports Matter
TLS-RPT record explained for agencies: where the DNS record lives, what rua means, how reports support MTA-STS, and what to audit.
Updated 7 May 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
TLS-RPT record explained in practical terms: TLS-RPT is a DNS-based reporting mechanism that lets a domain receive reports about SMTP TLS delivery problems. The record usually lives at _smtp._tls.example.com, and the rua value tells senders where to send aggregate reports. TLS-RPT provides visibility. It does not enforce encryption, guarantee deliverability, or replace MTA-STS.
Agencies should care because TLS-RPT is often missing, malformed, or pointed at an inbox nobody monitors. When a client publishes MTA-STS or wants stronger email transport-security posture, TLS-RPT helps reveal failures that would otherwise stay invisible.
Use Inbox Pulse to audit TLS-RPT alongside DMARC, SPF, DKIM, MX, MTA-STS, and BIMI across client domains. Use the broader 10-domain agency audit when you also need SSL, DNS, and domain expiry context. For how CertPilot checks public DNS records safely, see how CertPilot checks domains.
What TLS-RPT is
TLS Reporting, usually called TLS-RPT, is a way for domains to request reports about email transport-security failures. It is tied to SMTP delivery. When supporting senders encounter certain TLS-related delivery issues, they can send aggregate reports to the address listed in the TLS-RPT record.
TLS-RPT is not sender authentication like SPF or DKIM. It is not a DMARC policy. It is not a spam-filter setting. It is visibility for transport-security issues.
For the adjacent policy mechanism, read MTA-STS record check: how to audit email transport security.
Where the TLS-RPT DNS record lives
The TLS-RPT DNS record is a TXT record at:
_smtp._tls.example.com
Example:
_smtp._tls.example.com TXT "v=TLSRPTv1; rua=mailto:tlsrpt@example.com"
The exact reporting address should be owned and monitored. Agencies should not point reports to a personal mailbox that will be abandoned or ignored.
What rua means in TLS-RPT
In TLS-RPT, rua identifies where aggregate reports should be sent. The value is commonly a mailto: address.
| Tag | Example | Meaning |
|---|---|---|
| v | TLSRPTv1 | TLS-RPT version marker |
| rua | mailto:tlsrpt@example.com | Reporting destination |
Do not confuse TLS-RPT rua with DMARC rua, although the idea is similar. DMARC aggregate reports describe authentication results. TLS-RPT reports describe transport-security delivery issues.
If an agency or client cannot review the mailbox, the reports may provide little operational value.
How TLS-RPT relates to MTA-STS
MTA-STS publishes a transport-security policy. TLS-RPT provides reporting visibility. They are often deployed together because reports help teams understand whether delivery systems are having trouble with TLS or MTA-STS policy.
The relationship is simple:
| Mechanism | Role | |---|---| | MTA-STS | Publishes expectations for secure SMTP delivery to the domain | | TLS-RPT | Reports TLS delivery issues to a specified address |
TLS-RPT does not enforce MTA-STS. It reports. MTA-STS does not aggregate reports. It publishes policy. Agencies should check both when auditing client email transport security.
Why TLS-RPT is visibility, not enforcement
TLS-RPT does not make senders use TLS. It does not block messages. It does not quarantine mail. It does not prove inbox placement. It gives the domain owner a reporting path for certain TLS-related delivery problems.
That makes it valuable, but only if someone reviews the reports. A TLS-RPT record pointed at reports@example.com is not useful if that mailbox is unmonitored, over quota, or inaccessible to the team responsible for email operations.
Common TLS-RPT mistakes
| Mistake | Why it matters |
|---|---|
| Missing record | No report destination is published |
| Wrong hostname | Record is not at _smtp._tls |
| Invalid version | Receivers may ignore the record |
| Bad rua syntax | Reports may not be sent |
| Unmonitored mailbox | Reports are technically delivered but operationally wasted |
| Old vendor address | Reports go to a previous provider or consultant |
| No relationship to MTA-STS owner | Reports are not reviewed by the policy owner |
These are the same operational problems agencies see with DMARC reporting: publishing a reporting address is not the same as owning the process.
Agency TLS-RPT audit workflow
Use this workflow:
- Query
_smtp._tls.clientdomain.comfor TXT. - Confirm
v=TLSRPTv1. - Confirm the
ruavalue exists. - Confirm the reporting address is valid and owned.
- Check whether the mailbox is monitored or routed to a reporting platform.
- Check whether the domain also publishes MTA-STS.
- If MTA-STS exists, confirm the team receiving TLS-RPT reports owns the policy.
- Document the DNS host, reporting owner, and next action.
Use Inbox Pulse when you need to repeat this across many client domains instead of checking them one at a time.
Does every small business need TLS-RPT?
Not every small business needs TLS-RPT as an urgent first step. A client with no SPF, no DKIM, no DMARC, unknown senders, and poor DNS ownership probably has higher-priority work. TLS-RPT becomes more valuable when the client has meaningful email operations, publishes MTA-STS, or wants more visibility into transport-security failures.
For agency retainers, TLS-RPT can be part of a maturity ladder:
| Stage | Focus | |---|---| | Basic | SPF, DKIM, DMARC presence | | Operational | Sender inventory, alignment, DNS ownership | | Reporting | DMARC aggregate reports, TLS-RPT owner | | Transport security | MTA-STS policy and TLS-RPT visibility | | Ongoing review | Monthly proof reporting and change tracking |
For broader DNS change process, see monitor DNS changes across client websites.
How agencies can include TLS-RPT in audits
Agencies should report TLS-RPT in plain language:
- Present: record exists and has a reporting destination.
- Missing: no TLS-RPT record was found.
- Review: record exists, but syntax or reporting owner needs confirmation.
- Not prioritized: client does not yet have operational maturity for transport-security reporting.
Avoid overstating it. TLS-RPT is not a deliverability feature by itself. It is a reporting control that supports better email transport-security operations.
TLS-RPT audit table
Use this table when reviewing a domain:
| Check | Healthy signal | Follow-up |
|---|---|---|
| DNS location | TXT exists at _smtp._tls.domain | Fix hostname if record is elsewhere |
| Version | Record starts with v=TLSRPTv1 | Correct syntax |
| Reporting address | rua=mailto: points to owned mailbox | Assign owner or route to platform |
| Mailbox ownership | Team can access and review reports | Replace abandoned vendor address |
| MTA-STS relationship | Reports owner also knows MTA-STS status | Align policy and reporting owners |
| Client priority | Email risk justifies reporting overhead | Defer if higher-priority auth gaps exist |
This table helps agencies avoid a common trap: publishing a DNS record that nobody operationally owns.
Example TLS-RPT findings
Use precise findings:
| Finding | Meaning | Recommended action |
|---|---|---|
| Missing TLS-RPT | No reporting destination was found | Add only if someone will review reports |
| Invalid syntax | Record exists but may not be usable | Correct TXT value |
| Old reporting address | Reports go to a previous provider | Update rua destination |
| Present and owned | Reporting destination is valid | Include in monthly proof report |
This language keeps the audit practical. It lets a client understand whether the issue is missing visibility, broken syntax, or ownership.
How TLS-RPT fits into client reporting
In a monthly client report, TLS-RPT can be summarized as:
- Present or missing.
- Reporting address owner.
- Relationship to MTA-STS.
- Any action needed.
Do not flood a non-technical client with raw report terminology unless they asked for it. The useful message is whether the domain has visibility into transport-security failures and whether someone is responsible for reviewing that visibility.
What TLS-RPT reports can reveal
TLS-RPT reports can help identify classes of transport-security problems. Agencies do not need to parse every report manually for every client, but they should understand what the reports are meant to surface.
Reports may point to issues such as:
- TLS negotiation failures.
- Certificate validation problems.
- Policy failures related to MTA-STS.
- Delivery attempts to unexpected or stale MX hosts.
- Misalignment between published policy and actual mail infrastructure.
The reports do not tell you whether a campaign performed well. They do not measure inbox placement. They are about transport-security delivery conditions.
Ownership models for agencies
There are three common ownership models:
| Model | Who receives reports | When it works | |---|---|---| | Client-owned mailbox | Client IT or operations team | Client has internal technical owner | | Agency-owned mailbox | Agency support or infrastructure team | Agency manages ongoing care plan | | Platform-managed address | Third-party monitoring/reporting tool | Client wants structured report processing |
The wrong model is "nobody knows." If reports go to a mailbox no one opens, TLS-RPT is only decorative DNS.
TLS-RPT and DNS migrations
DNS migrations are a common time for TLS-RPT records to disappear. The record is under _smtp._tls, so it may be missed if someone copies only obvious records like MX, SPF, DKIM, and DMARC.
Before a DNS migration, export:
- MX records.
- SPF TXT records.
- DKIM TXT or CNAME records.
- DMARC record.
- MTA-STS record.
- TLS-RPT record.
- Verification TXT records.
After migration, recheck public DNS. This is a good reason to include TLS-RPT in broader DNS change workflows rather than treating it as an isolated email setting.
When to escalate TLS-RPT issues
Escalate when:
- MTA-STS is in enforce mode and reports show failures.
- Reports go to a former vendor.
- The reporting mailbox is inaccessible.
- The client has compliance-sensitive email operations and no report owner.
- A DNS migration changed mail-related records unexpectedly.
Do not escalate as an emergency just because TLS-RPT is absent on a very small domain with no MTA-STS policy and basic authentication gaps. Prioritize based on client risk and operational maturity.
Related resources
- MTA-STS record check for agencies
- DMARC, SPF, and DKIM explained for agencies
- Bulk DMARC check for client domains
- MX record monitoring for agencies
Frequently Asked Questions
What is a TLS-RPT record?
A TLS-RPT record is a DNS TXT record that publishes where aggregate SMTP TLS reports should be sent. It usually lives at _smtp._tls.example.com and includes a value such as v=TLSRPTv1; rua=mailto:tlsrpt@example.com. The record gives supporting senders a reporting destination for TLS-related delivery issues.
Does TLS-RPT enforce email encryption?
No. TLS-RPT does not enforce anything. It reports certain TLS-related delivery failures. MTA-STS is the policy mechanism commonly paired with TLS-RPT, but even MTA-STS is not a deliverability guarantee. Agencies should explain TLS-RPT as visibility, not enforcement.
How does TLS-RPT relate to MTA-STS?
TLS-RPT provides reporting visibility, while MTA-STS publishes transport-security expectations. They are often deployed together because TLS-RPT can help teams see problems related to secure SMTP delivery and MTA-STS policy. A domain can have one without the other, but agencies should check both when auditing email transport security.
What does rua mean in TLS-RPT?
In TLS-RPT, rua means the aggregate reporting destination. It is commonly a mailto: address, such as rua=mailto:tlsrpt@example.com. Agencies should confirm that the mailbox exists, is monitored, and belongs to the team or platform responsible for reviewing reports. An unmonitored reporting address creates visibility in theory but not in practice.
Should every client domain publish TLS-RPT?
Not every client domain needs TLS-RPT immediately. It is most useful when email is important, the client has mature DNS ownership, or MTA-STS is being deployed. For clients with basic SPF, DKIM, or DMARC gaps, those issues may be more urgent. Agencies can still include TLS-RPT in audits as a maturity signal.
Can Inbox Pulse monitor ongoing TLS-RPT reports?
No. Inbox Pulse is a bulk configuration audit layer. It can help agencies check whether TLS-RPT records appear to be present and configured, but it does not aggregate ongoing TLS-RPT reports or replace a transport-security reporting platform. If the client needs continuous report analysis, assign an owner or use a dedicated reporting workflow.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.