Belgium · Financial Services · Case Study

Belgian Financial Services Firm: DMARC p=reject Enforcement Without Disrupting Legitimate Sending

Belgium Financial Services Q2 2025 Cloud Server for Email Infrastructure
← Back to Case Studies
6
Sending Domains Secured
14
Sending Systems Identified
100%
DMARC Alignment Achieved
0
Legitimate Emails Blocked

DMARC enforcement required by internal compliance — but nobody knew all the sending systems

A Brussels-based financial services company with 2,400 employees received a compliance directive requiring DMARC p=reject on all corporate domains by end of Q2. Their security team had already set DMARC to p=none on the primary domain and understood the requirement. What they had not anticipated was the complexity of discovering every system that sent email as the corporate domain.

Initial DMARC aggregate report analysis revealed 14 distinct sending systems — 6 of which were completely unknown to the IT security team. These included: a third-party HR system sending offer letters, a legacy invoice system operated by a subsidiary, a customer satisfaction survey platform, and several smaller web applications.

DMARC aggregate report analysis over 30 days

Rather than moving directly to enforcement, the implementation began with a 30-day monitoring period at p=none, with aggregate report collection and analysis. Every source IP sending as the corporate domains was catalogued — including sources that were failing SPF alignment, failing DKIM alignment, or failing both.

Sending Systems by Authentication Status

14 systems discovered across 6 domains
SPF+DKIMSPF OnlyDKIM OnlyNeither ■ Before ■ After
# Discovered sending systems (anonymised): # 1. Primary MTA (PowerMTA) — SPF + DKIM aligned ✓ # 2. Marketing platform — DKIM only, SPF misaligned ✗ # 3. CRM system — SPF only, no DKIM ✗ # 4. HR onboarding tool — neither SPF nor DKIM ✗ # 5. Invoice system (subsidiary) — separate IP, no records ✗ # 6. Survey platform — SPF aligned, DKIM not configured ✗ # 7-14: Various web apps, legacy systems, API senders # Action required before enforcement: # - Configure DKIM on 8 systems # - Correct SPF alignment on 4 systems # - Add 6 new IP ranges to SPF records # - Deprecate 3 legacy systems (no business justification)

Gradual escalation: none → quarantine → reject

Authentication remediation for all 14 systems was completed over 8 weeks. Systems that could not be configured for DKIM (two legacy applications scheduled for deprecation) were migrated to route through the primary MTA — allowing DKIM signing at the gateway level without application changes.

DMARC policy moved to p=quarantine at week 9 with ruf (failure report) sampling enabled. Failure reports confirmed only 0.2% of messages were failing alignment — all from a single external forwarding service used by two employees. After addressing the forwarding configuration, p=reject was applied at week 12. Zero legitimate messages were blocked.

Compliance and Security Outcome The implementation also had a secondary benefit: it revealed two unauthorised sending systems that had been used to send emails on behalf of the company's domain without IT knowledge. These were identified through the aggregate report analysis and removed. Domain spoofing attempts in DMARC failure reports dropped by 94% within two weeks of p=reject enforcement.

DMARC Enforcement at Scale: The Technical Migration Path

Moving from DMARC p=none to p=reject in a large financial services environment is one of the highest-risk authentication changes an organization can undertake. At p=none, DMARC failures generate reports but do not affect delivery. At p=reject, DMARC failures cause messages to be rejected or silently dropped by receiving MTAs. Misconfigured sending paths that were invisible under p=none suddenly produce delivery failures affecting legitimate business communications.

The Belgian financial services firm managed 23 distinct sending domains — some customer-facing, some internal, some operated by third-party partners. The challenge was not configuring DMARC correctly on the primary sending infrastructure; it was identifying and correcting every sending path across all 23 domains before enforcement could be activated without causing collateral delivery failures.

Six weeks of DMARC aggregate report analysis (with rua= configured at p=none) revealed 47 distinct IP addresses sending as the company's domains. Of these, 23 were known and correctly configured. The remaining 24 were unknown or partially configured:

  • 7 IPs belonging to a legacy marketing platform still in use by a business unit that had not been included in the authentication migration project
  • 4 IPs from a third-party claims processing vendor sending notifications on behalf of the firm
  • 3 IPs from a document management SaaS platform that included the firm's domain in automated customer notifications
  • 6 IPs from internal IT systems (Jira, Confluence, monitoring tools) sending as corporate domains
  • 4 IPs from an acquired subsidiary operating on different infrastructure

Remediation Sequence by Sending Path Category

Phase 1: Internal IT Systems (Weeks 1-3)

Internal monitoring tools, project management systems, and corporate applications were addressed first because they were the most straightforward to correct: configure SMTP relay through the main PowerMTA infrastructure (which already has DKIM signing for the corporate domain) rather than sending directly. This eliminated 6 IPs from the DMARC failure list without requiring any DNS changes.

Phase 2: Third-Party Vendors (Weeks 4-10)

Third-party vendors required either: configuring them to relay through the main infrastructure, publishing their sending IPs in the firm's SPF record (if they used SPF-based sending), or enabling DKIM signing with a subdomain-specific key. Each vendor had a different technical capability and different integration timeline. The claims processing vendor required 6 weeks to implement subdomain DKIM signing.

Phase 3: Subsidiary Integration (Weeks 8-16)

The acquired subsidiary operating on separate infrastructure required the most complex migration. Their PowerMTA environment was configured to sign with DKIM keys for the parent company's DMARC-covered domains, and their sending IPs were added to the consolidated SPF record. This required coordination between two separate IT teams and two separate DNS management systems.

Phase 4: DMARC Enforcement Progression (Weeks 16-24)

With all sending paths identified and remediated, DMARC enforcement was activated progressively: p=quarantine at pct=5 for two weeks (5% of failing messages quarantined), pct=25 for two weeks, pct=50 for two weeks, pct=100 for two weeks, then p=reject at pct=100. Each stage was monitored via aggregate reports and PowerMTA accounting log for unexpected delivery failures.

StageDMARC PolicyDurationMonitoring Focus
Baselinep=none6 weeksAggregate report collection; sending path discovery
Initial enforcementp=quarantine; pct=52 weeksMonitor for unexpected quarantine events
Ramp quarantinep=quarantine; pct=1004 weeksConfirm no legitimate failures at 100%
Full enforcementp=reject; pct=100PermanentOngoing monitoring; alert on any new failures
Sending Paths Identified
Before
23 known
After
47 total

24 previously unknown
DMARC Pass Rate
Before
61%
After
99.8%

All 23 domains
Gmail Inbox Rate
Before
74%
After
94%

Post p=reject
Spoofing Attempts Blocked
Before
N/A
After
~120/month

p=reject in effect

DMARC enforcement reveals the complexity of large organizations' email sending practices. What appears to be a simple DNS change at p=reject is actually an audit of every system that sends as your domain — a project that typically uncovers sending paths that IT, marketing, and compliance teams did not know existed. This discovery phase is the most valuable part of the project.

— Cloud Server for Email Infrastructure Team

Similar infrastructure challenges?

Contact the technical team to discuss your specific situation. We assess each environment individually before recommending an architecture.