Skip to content

Instantly share code, notes, and snippets.

@wenboown
Created January 5, 2026 15:06
Show Gist options
  • Select an option

  • Save wenboown/19dbd882e5b8da749795f4739bd187eb to your computer and use it in GitHub Desktop.

Select an option

Save wenboown/19dbd882e5b8da749795f4739bd187eb to your computer and use it in GitHub Desktop.
trouble shooting google workspace calendar invite got labelled as spam

answered by gemini 3

I have a google workspace account, but my google meet/calendar invite got labeled as spam and cannot reach receipents, what configuration do I need to do?

This issue is common for Google Workspace accounts that haven’t fully "authenticated" their domain with the latest security protocols. Because Google updated its spam policies significantly in late 2024 and 2025, unauthenticated invites are often automatically redirected to Junk or blocked entirely.

To fix this, you need to perform three technical DNS configurations and one specific Calendar setting.


1. Essential Email Authentication (The "Big Three")

Most recipients' spam filters (especially Outlook and other Gmail accounts) will reject invites if your domain isn't verified as the sender. You must add these TXT records to your domain's DNS settings (e.g., in GoDaddy, Namecheap, Cloudflare).

A. SPF (Sender Policy Framework)

This tells the world that Google is authorized to send emails on your behalf.

  • Type: TXT
  • Host/Name: @ (or leave blank)
  • Value: v=spf1 include:_spf.google.com ~all

Note: If you already have an SPF record for another service (like Mailchimp), do not create a second one. Combine them: v=spf1 include:_spf.google.com include:servers.mcsv.net ~all.

B. DKIM (DomainKeys Identified Mail)

This adds a digital signature to your invites, proving they weren't tampered with.

  1. Go to Google Admin Console (admin.google.com).
  2. Navigate to Apps > Google Workspace > Gmail > Authenticate email.
  3. Select your domain and click Generate new record.
  4. Copy the generated TXT record and add it to your DNS.
  5. Wait 1 hour, then go back to the Admin Console and click Start Authentication.

C. DMARC (Domain-based Message Authentication)

This is now a requirement for reaching Gmail and Yahoo inboxes reliably.

  • Type: TXT
  • Host/Name: _dmarc
  • Value: v=DMARC1; p=none; rua=mailto:admin@yourdomain.com

Start with p=none. This tells servers: "Check my SPF/DKIM, but don't block the mail yet if it fails." Once you are sure your setup is correct, you can change it to p=quarantine.


2. Google Workspace Calendar Sharing Settings

Sometimes, the invite isn't just "spam" but is hidden by a new Google security feature called "Known Senders." If your recipient also uses Google, they might not see your invite unless they've interacted with you before.

As an Admin, you can improve delivery by:

  1. Enabling External Sharing: In Admin Console, go to Apps > Google Workspace > Calendar > Sharing settings.
  2. Set External sharing options for primary calendars to at least "Share all information, but outsiders cannot change calendars."
  3. External Invitations: Ensure the box "Warn users when inviting guests outside of [your domain]" is unchecked if you want to avoid a "This might be spam" warning banner on your invites.

3. Best Practices to Avoid Future Flags

  • Avoid "Spammy" Subjects: Don't use "URGENT MEETING" or "CASH INCENTIVE" in your Calendar titles.
  • Add a Description: Invites with a blank body are more likely to be flagged. Add a short "Hi, look forward to meeting you" in the event description.
  • Recipient Action: If you are in contact with the recipient (via Slack/LinkedIn), ask them to click "I know the sender" or "Add to calendar" on the first invite. This "whitelists" you for all future invites.

Troubleshooting Step

If you've done the above and still have issues, use the Google Admin Toolbox Messageheader. Send an invite to yourself at a personal @gmail.com address, open the email, click the three dots → "Show Original," and paste the text into that tool. It will tell you exactly which check (SPF, DKIM, or DMARC) is failing.


for DMARC (Domain-based Message Authentication), you said "rua=mailto:admin@yourdomain.com", do I need to add this for every email account in my company/domain?

No, you definitely do not need to add this for every individual email account.

DMARC is a domain-wide security policy. You only need to create one DNS record for your entire domain (e.g., yourdomain.com), and it will automatically cover every single email address that ends in @yourdomain.com.

How it Works

Think of DMARC as a set of instructions for the "post office" (the receiving mail servers). Instead of giving instructions for every individual resident (email account), you are giving a single instruction for the entire building (your domain).


Key Details About Your DMARC Setup

  • One Record per Domain: You add a single TXT record at the "host" or "name" _dmarc. This covers ceo@yourdomain.com, sales@yourdomain.com, and support@yourdomain.com all at once.
  • The rua Address: This is simply the "reporting" mailbox. You choose one email address where you want to receive daily data reports. These reports are technical XML files that show which servers are sending mail using your domain and whether they passed or failed security checks.
  • Centralized Monitoring: Most companies use a single dedicated address like dmarc-reports@yourdomain.com so that one admin can monitor everything in one place.

Can I add multiple reporting addresses?

If you want two different people or services to receive the reports, you can list them in the same single record by separating them with a comma:

v=DMARC1; p=none; rua=mailto:admin@yourdomain.com,mailto:security@yourdomain.com


A Common Mistake to Avoid

Do not create multiple DMARC records. If you accidentally add two different TXT records for _dmarc, receiving servers will get confused and might ignore your DMARC policy entirely, which could lead back to your invites being marked as spam.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment