DMARC
Definition
DMARC: Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication policy protocol that builds upon SPF and DKIM to give domain owners control over what happens to emails that fail authentication checks, while providing visibility through aggregate and forensic reports.
What is DMARC?
DMARC (Domain-based Message Authentication, Reporting and Conformance) is the policy layer that sits on top of SPF and DKIM authentication. While SPF and DKIM verify emails are legitimate, DMARC tells receiving servers what to do when emails fail these checks - and critically, provides reports so you can see exactly what is happening with emails sent using your domain.
Think of DMARC as the enforcement mechanism. SPF and DKIM are like showing your ID at a security checkpoint. DMARC is the policy that says "if someone shows a fake ID claiming to be from our company, here is what you should do about it" - and then gives you surveillance footage of everyone who tried to get in.
How DMARC Works
DMARC verification follows a specific process:
- Email Received - A message claiming to be from @yourdomain.com arrives at the recipient's mail server
- SPF/DKIM Check - The server checks if SPF and/or DKIM pass
- Alignment Check - DMARC requires the authenticated domain to match (align with) the visible "From" address
- Policy Lookup - Server retrieves your DMARC policy from _dmarc.yourdomain.com
- Policy Enforcement - Based on your policy (none/quarantine/reject) and whether checks passed, the server takes action
- Reporting - The server sends you reports about this authentication attempt
Understanding DMARC Policies
DMARC policies are published as DNS TXT records at _dmarc.yourdomain.com:
v=DMARC1; p=quarantine; rua=mailto:dmarc@yourdomain.com; pct=100
- p=none - Monitor only. Failed emails are delivered normally, but you receive reports. Use this initially to understand your email ecosystem.
- p=quarantine - Failed emails go to spam/junk folder. Moderate protection while you verify legitimate sources.
- p=reject - Failed emails are blocked entirely. Maximum protection but requires confidence all legitimate sources are properly authenticated.
- rua= - Email address to receive aggregate reports (daily summaries)
- ruf= - Email address to receive forensic reports (individual failure details)
- pct= - Percentage of emails to apply policy to (allows gradual rollout)
The DMARC Implementation Journey
Implementing DMARC properly is a journey, not an instant change:
- Start with p=none - Collect reports for 2-4 weeks without affecting mail flow
- Analyze Reports - Identify all legitimate email sources (marketing platforms, CRMs, transactional services)
- Fix Authentication - Ensure every legitimate source has proper SPF and DKIM configuration
- Gradual Enforcement - Move to p=quarantine at pct=10, then 25, then 50, then 100
- Full Protection - Once confident, move to p=reject for maximum protection
Skipping straight to p=reject without this process often blocks legitimate emails from services you forgot to configure properly.
DMARC Alignment Explained
DMARC introduces the concept of "alignment" - the authenticated domain must match the visible "From" address. There are two alignment modes:
- Relaxed Alignment (aspf=r, adkim=r) - Organizational domain match is sufficient. mail.yourdomain.com aligns with yourdomain.com.
- Strict Alignment (aspf=s, adkim=s) - Exact domain match required. mail.yourdomain.com does NOT align with yourdomain.com.
Most organizations use relaxed alignment for flexibility while maintaining security.
Why DMARC Matters
DMARC provides three critical benefits:
- Visibility - Reports show every email sent using your domain, including ones you do not send (phishing attempts, misconfigured services)
- Protection - Prevents bad actors from spoofing your domain in phishing attacks
- Deliverability - Gmail, Microsoft, and Yahoo now require DMARC for bulk senders and weight it heavily in filtering decisions
Common DMARC Misconceptions
Many believe DMARC only matters for large organizations - in reality, small domains are frequent phishing targets because they lack protection. Others think DMARC breaks email forwarding - while forwarding can fail SPF, properly configured DKIM survives forwarding and provides DMARC alignment.
A dangerous misconception is implementing p=reject immediately. Without the monitoring phase, you may block critical business emails from forgotten services like your CRM, accounting software, or automated notifications.
WarmySender works within properly authenticated domains. We recommend having DMARC configured (even at p=none initially) before beginning email outreach to ensure maximum deliverability.
Frequently Asked Questions
Should I start DMARC with p=reject?
No - starting with p=reject is dangerous. You should begin with p=none for 2-4 weeks to collect reports and understand your email ecosystem. This monitoring period reveals all legitimate email sources (marketing platforms, CRMs, transactional systems) that need proper SPF/DKIM configuration. Only after verifying all sources are authenticated should you gradually move to p=quarantine and eventually p=reject.
What are DMARC aggregate reports?
Aggregate reports (rua) are daily XML summaries sent by receiving mail servers showing: how many emails claimed to be from your domain, which sources sent them (IP addresses), whether SPF/DKIM passed or failed, and what action was taken based on your policy. Free tools like DMARC Analyzer, Postmark DMARC, or Valimail can parse these reports into readable dashboards.
Do I need DMARC if I have SPF and DKIM?
Yes - while SPF and DKIM provide authentication, they have gaps. SPF does not protect the visible From address. DKIM alone does not tell receivers what to do about failures. DMARC ties them together with alignment requirements and enforcement policies. Additionally, Google and Yahoo now require DMARC for bulk senders, and it positively impacts deliverability across all major email providers.