You need a new address like sales@ or billing@. You have two choices: a Domain Email Alias or a Full Mailbox.
In legacy environments like Google
Workspace or Microsoft 365, this is a financial decision. A mailbox costs
$6–30/month; an alias is free. This pricing model forces businesses into bad
architecture, using aliases where they should use mailboxes, leading to
security leaks, broken workflows, and compliance failures.
This guide is the technical decision
framework. We analyze the protocol-level differences, the operational risks of
"ghost users," and the exact scenarios for each configuration.
The
Core Technical Distinction
To make the right choice, you must
understand what happens at the SMTP level.
|
Feature |
Domain Email Alias |
Full Mailbox (User) |
|
SMTP Function |
RCPT TO Rewrite (Pointer) |
Storage Container (Endpoint) |
|
Authentication |
None (Cannot authenticate) |
Dedicated Credentials (User/Pass) |
|
Storage |
0 GB (Uses destination's quota) |
Dedicated (e.g., 15GB - 50GB) |
|
Audit Trail |
Commingled with recipient |
Isolated Logs |
|
Outbound Identity |
Difficult (Requires "Send As") |
Native (Default From header) |
|
Cost (Legacy) |
Free |
Per-User Monthly Fee |
|
Cost (TrekMail) |
Included |
Included (Pooled Storage) |
1.
The Alias: A Routing Instruction
An alias is not a location; it is a
rule. When an MTA (Mail Transfer Agent) receives mail for alias@domain.com, it
rewrites the envelope recipient to primary@domain.com and delivers it there.
- Pros:
Zero maintenance, zero storage overhead.
- Cons:
No login. If you need to search for an email sent to the alias three years
ago, you must search the primary user's inbox, which is likely filled
with unrelated noise.
2.
The Mailbox: An Identity
A mailbox is a distinct object with
its own storage partition and credentials.
- Pros:
Isolation. You can hand the credentials to a new employee, an auditor, or
a script without exposing your personal mail.
- Cons:
In per-seat pricing models, this gets expensive fast.
The
"Reply" Friction: Identity Leakage
The single biggest operational
failure with aliases is the "Reply" workflow.
The Scenario:
You alias support@ to your personal email founder@. A customer emails support@.
You hit reply.
The Failure:
Unless you have meticulously configured your client, the reply comes from
founder@. You have broken the "professional veil." The customer now
has your direct email and will bypass the support channel forever.
The Fix (Hard Way):
To reply as an alias, you must configure "Send As" settings:
- Google Workspace:
You must add the alias as a secondary address, verify it via code, and
uncheck "Treat as an alias" to force the correct Return-Path.
- Microsoft 365:
You often need to enable Set-OrganizationConfig -SendFromAliasEnabled
$true via PowerShell to prevent Outlook from attaching "On Behalf
Of" headers that reveal your primary identity.
- Outlook/Thunderbird:
You must manually select the From dropdown for every single reply. One
slip-up exposes you.
The Mailbox Advantage:
When you log in as support@, every reply defaults to support@. There is no
configuration to break and no identity to leak.
The
Forwarding Trap: SPF, SRS, and DMARC
Many operators create an alias to
forward mail to an external destination (e.g., contact@business.com ->
coolguy123@gmail.com).
This is architecturally fragile.
Modern email authentication (SPF,
DKIM, DMARC) is designed to prevent unauthorized IPs from sending mail on
behalf of a domain. Forwarding breaks this chain.
- The SPF Break:
When bank.com sends to your alias, and your alias forwards to Gmail, Gmail
sees your server's IP, not the Bank's. The Bank's SPF record does
not authorize your IP. SPF fails.
- The DMARC Reject:
If the Bank has a strict DMARC policy (p=reject), Gmail will reject the
email entirely.
To make external forwarding work,
your host must support:
- SRS (Sender Rewriting Scheme): Rewrites the envelope sender to your domain to
pass SPF.
- ARC (Authenticated Received Chain): Cryptographically signs the message to preserve the
original authentication results.
Warning: Many budget registrars do not support ARC. If you use an
alias to forward to Gmail on a cheap host, you will silently lose legitimate
email.
For a deep dive on fixing this, read
Email Forwarding: How It Works, How to Set It Up, and How to
Fix It When It Breaks (2026).
Operational
Risk: The "Bus Factor"
Aliases create "Key Person
Risk."
Scenario:
You alias billing@ to alice@. Alice manages all invoices.
Alice leaves the company. You delete Alice's user account.
The Fallout:
- Immediate Bounce:
billing@ ceases to exist. Invoices bounce.
- Data Loss:
Unless you exported Alice's mailbox before deletion, the history of
billing@ is gone.
- Discovery Nightmare:
If you keep Alice's mailbox active for the records, you are retaining all
her personal HR chats just to keep the invoices.
The Mailbox Solution:
If billing@ is a dedicated mailbox, Alice simply has delegated access. When
Alice leaves, you revoke her access. The mailbox, the invoices, and the history
remain untouched. You then grant access to Bob. Zero downtime, zero data loss.
Decision
Matrix: What to Build
Use this logic to determine your
configuration.
1.
The Founder (first.last@)
- Verdict:
Mailbox
- Reason:
This is a primary identity requiring 2FA, private storage, and mobile
sync.
2.
High-Volume Roles (support@, billing@, jobs@)
- Verdict:
Mailbox
- Reason:
- Audit:
You need a clean "Sent Items" folder for these roles.
- Handoff:
These roles will eventually be transferred to different employees or
external contractors.
- Volume:
These addresses attract spam. You do not want 500 spam messages/day
mixing with your personal inbox.
3.
Low-Volume Routing (info@, media@)
- Verdict:
Alias
- Reason:
These are "catch-all" buckets for low-priority traffic. Routing
them to an Office Manager is acceptable.
4.
Temporary/Burner (conference2026@, vendor-name@)
- Verdict:
Alias
- Reason:
Use these to track who sells your data. If linkedin-signup@yourdomain.com
starts getting spam, you can delete the alias instantly.
5.
The "Catch-All" (*@domain.com)
- Verdict:
Do Not Use (Or Quarantine)
- Reason:
A catch-all alias accepts every spam message sent to your domain. This
invites Directory Harvest Attacks (DHA) and can ruin your domain's
reputation if you auto-forward this traffic. If you must use a catch-all,
route it to a dedicated "Junk" mailbox, never a user's primary
inbox.
The
TrekMail Advantage: Professional Architecture, Flat Price
The industry standard of
"paying per mailbox" is the root cause of bad email architecture. It
forces you to use aliases where you need mailboxes.
TrekMail removes the penalty.
We charge a flat rate for the
domain. We do not charge per user.
- Pooled Storage:
You have a bucket of storage (e.g., 15GB or 200GB). You can slice that
bucket into as many mailboxes as you need.
- The "Free" Mailbox: Creating support@ as a real mailbox costs you $0
extra. It consumes storage from your pool, but it doesn't trigger a new
license fee.
For SMBs:
You can finally set up billing@, sales@, and support@ as distinct, secure
mailboxes. You get the professional isolation of an enterprise setup without
the enterprise bill.
For Agencies:
You can provision 50 mailboxes for a client without calculating license costs.
If a client needs a new user, you just add it. No upsell conversation required.
Stop compromising your
infrastructure to save $6/month.
Stop
fighting DNS. Try TrekMail for free.

Comments
Post a Comment