> DMARC | Email Infrastructure Glossary | Cloud Server for Email > >

DMARC

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that builds on SPF and DKIM, adding domain alignment checks and policy e

DMARC — Domain-based Message Authentication, Reporting, and Conformance — is a DNS TXT record that extends SPF and DKIM by adding two critical capabilities: alignment checking (the authenticated domain must match the visible From header domain) and policy enforcement (ISPs are told what to do with messages that fail the check).

Without DMARC, a spammer can send email that passes SPF authentication using a legitimately registered domain in the SMTP envelope while showing your company's domain in the From header visible to recipients. SPF alone doesn't protect against this because it checks the envelope sender, not the From header. DMARC closes this gap by requiring that the domain authenticated by SPF or DKIM must align with the domain in the From header.

How DMARC Works: The Technical Mechanism

When a receiving mail server receives a message, it:

  1. Extracts the From header domain (what the recipient sees)
  2. Runs SPF check against the envelope sender and checks alignment with From domain
  3. Verifies DKIM signature and checks that the d= tag aligns with From domain
  4. Looks up the From domain's DMARC record
  5. If both SPF and DKIM fail alignment, applies the policy in the DMARC record
  6. Sends a report to the rua address in the DMARC record

A DMARC check "passes" if either SPF or DKIM passes with proper alignment — both don't need to pass. This is important: if your DKIM signature is valid and aligned with the From domain, DMARC passes even if SPF fails (which can happen when email is forwarded through another server).

DMARC Record Syntax

A DMARC record is published as a DNS TXT record at _dmarc.yourdomain.com:

v=DMARC1; p=quarantine; pct=100; rua=mailto:dmarc@yourdomain.com; sp=none; adkim=r; aspf=r

TagMeaningOptions
v=DMARC1Version identifier (required)Must be DMARC1
p=Policy for From domain failuresnone, quarantine, reject
sp=Policy for subdomain failuresnone, quarantine, reject (inherits p= if omitted)
pct=Percentage of failing mail to apply policy to1–100 (default 100)
rua=Aggregate report destinationmailto: URI
ruf=Forensic report destinationmailto: URI (optional)
adkim=DKIM alignment moder (relaxed) or s (strict)
aspf=SPF alignment moder (relaxed) or s (strict)

DMARC Policy Levels Explained

p=none: Monitor-only. ISPs accept mail regardless of DMARC result and send reports to your rua address. No email is rejected or quarantined. This is the starting point for all DMARC deployments — it lets you see your authentication landscape before enforcing anything.

p=quarantine: Failing mail is treated as suspicious — typically routed to the spam/junk folder. This is an intermediate enforcement level that catches most spoofing attacks while being less disruptive than p=reject if any legitimate sources are misconfigured.

p=reject: Failing mail is rejected outright. This is the gold standard — it means spoofed email claiming to be from your domain never reaches recipient inboxes. Required for BIMI implementation and provides the strongest brand protection.

Deployment Roadmap: p=none to p=reject

The standard deployment sequence:

  1. Phase 1 (Weeks 1–4): p=none — Collect aggregate reports. Identify all sending sources (ESPs, CRMs, applications, partner tools) that send email on behalf of your domain.
  2. Phase 2 (Weeks 4–8): Authentication cleanup — Configure DKIM signing and SPF authorization for every legitimate sending source identified in Phase 1. Still at p=none.
  3. Phase 3 (Weeks 8–10): p=quarantine pct=10 — Apply quarantine policy to 10% of failing mail. Watch for legitimate mail being affected.
  4. Phase 4 (Weeks 10–12): p=quarantine — Full quarantine. Continue monitoring.
  5. Phase 5 (Week 12–14): p=reject pct=10 — Begin rejection at 10% to catch any missed legitimate sources.
  6. Phase 6: p=reject — Full enforcement. Ongoing monitoring to catch new sending sources.

Reading DMARC Aggregate Reports

DMARC aggregate reports (rua) arrive as XML files from major ISPs — Gmail, Outlook, Yahoo, and others. They show per-IP sending data including volume, SPF pass/fail, DKIM pass/fail, and DMARC disposition for every IP that sent mail claiming your domain.

For operational use, parse these XML files through a DMARC reporting tool (dmarcian, EasyDMARC, Valimail, or PowerDMARC). These tools transform the raw XML into dashboards that show authorized vs unauthorized senders, authentication rates by source, and any active spoofing campaigns targeting your domain.

The first week of DMARC aggregate reports typically reveals sending sources that domain owners didn't know existed — old CRM integrations, partner notification systems, automated alerts from cloud services. Each of these needs to be addressed before moving past p=none.

Last updated: January 2026 · Email Infrastructure Glossary

Expert Infrastructure Support

Questions about dmarc in your sending environment? Our infrastructure team can help.

Talk to an Engineer