Knowledge Base

DMARC Implementation Guide

Configure DMARC to protect your domain from email spoofing and receive reports on email authentication.

Intermediate8 min read

Quick Overview

1
Set Up SPF/DKIM
2
Create Policy
3
Add DNS Record
4
Monitor Reports

What is DMARC?

DMARC (Domain-based Message Authentication, Reporting & Conformance) builds on SPF and DKIM to:

1. Tell receiving servers what to do when SPF/DKIM fail 2. Get reports about emails using your domain 3. Prevent domain spoofing and phishing

DMARC is required by Google and Yahoo for bulk senders since February 2024.

DMARC Record Format

DMARC is published as a TXT record at _dmarc.yourdomain.com:

v=DMARC1; p=none; rua=mailto:[email protected]

The "rua" tag tells servers where to send aggregate reports about your email.

DMARC Policy Options

The policy (p=) determines what happens to failing emails:

p=none - Monitor only, don't take action (start here) • p=quarantine - Mark failing emails as spam • p=reject - Block failing emails completely

Also consider: • sp= - Policy for subdomains • pct= - Percentage of emails to apply policy to (for gradual rollout)

DMARC Alignment

DMARC requires alignment between the "From" header and authenticated domain:

SPF Alignment: The Return-Path domain must match the From domain • DKIM Alignment: The DKIM signing domain (d=) must match the From domain

Either SPF OR DKIM must pass AND align for DMARC to pass.

Third-party senders (marketing platforms, CRMs) may break alignment. Configure them to use your domain for signing.

Implementation Steps

1. Start with monitoring:

v=DMARC1; p=none; rua=mailto:[email protected]; ruf=mailto:[email protected]

Implementation Steps (continued)

2. Wait and analyze reports for 2-4 weeks

3. Fix authentication issues for legitimate senders

4. Move to quarantine:

v=DMARC1; p=quarantine; pct=25; rua=mailto:[email protected]

Implementation Steps (final)

5. Gradually increase pct to 100%

6. Finally, move to reject:

v=DMARC1; p=reject; rua=mailto:[email protected]; adkim=s; aspf=s

adkim=s and aspf=s enforce strict alignment for maximum protection.

Reading DMARC Reports

Aggregate reports (rua) are XML files sent daily. They show: • IP addresses sending email as your domain • SPF and DKIM results for each source • Volume of emails from each source

Use services like Postmark DMARC, DMARC Analyzer, or parse them yourself.

Common Pitfalls to Avoid

  • Starting with p=reject

    Always start with p=none to monitor. Jumping to reject can block legitimate email.

  • Missing rua address

    Without aggregate reports, you cannot see who is sending email as your domain.

  • Third-party alignment issues

    Marketing platforms and CRMs may not align. Configure them to use your domain for signing.

  • Ignoring subdomain policy

    Set sp= to protect subdomains, or attackers may spoof them instead.

Check Your Configuration

Use IntoDNS.ai to verify your setup is correct