Understanding DMARC (Domain-based Message Authentication) and email security
DMARC (Domain-based Message Authentication) is an email authentication protocol that tells ISPs how to handle emails that fail SPF or DKIM authentication checks. DMARC policies specify whether to accept, quarantine, or reject emails that fail authentication.
DMARC works with SPF and DKIM to provide comprehensive email security. It prevents email spoofing and phishing, improves email deliverability, protects domain reputation, and provides visibility into email authentication.
Check your DMARC records and use our email authentication checker to verify DMARC is properly configured.
DMARC policies prevent unauthorized senders from using your domain, protecting against email spoofing and phishing attacks.
Proper DMARC configuration improves email deliverability by signaling to ISPs that you're a legitimate, security-conscious sender.
DMARC protects your domain from being used for spam or fraud, maintaining positive domain reputation.
DMARC reports provide visibility into email authentication, showing who's sending emails from your domain and authentication results.
DMARC is an industry standard expected by ISPs for optimal email security and deliverability.
DMARC enables domain owners to enforce policies on how ISPs handle emails that fail authentication.
Domain owners publish DMARC policies in DNS as TXT records, specifying how ISPs should handle emails that fail authentication.
Receiving mail servers evaluate SPF and DKIM authentication results for incoming emails.
If SPF or DKIM fails, servers check the DMARC policy to determine how to handle the email.
ISPs enforce DMARC policies: none (accept), quarantine (send to spam), or reject (block).
DMARC generates reports showing authentication results and email sending activity.
DMARC checks alignment between SPF/DKIM domains and the From domain to ensure proper authentication.
DMARC policies specify how ISPs should handle emails that fail authentication:
Accept emails but monitor authentication results. This is the starting policy for testing DMARC without affecting delivery.
Send emails that fail authentication to spam folders. This provides protection while allowing some delivery.
Block emails that fail authentication entirely. This provides maximum protection but requires careful setup.
Start with 'none' for monitoring, then move to 'quarantine' after verifying authentication, and finally to 'reject' for maximum protection.
DMARC checks alignment between authentication domains and the From domain:
SPF alignment checks if the SPF-authenticated domain matches the From domain (strict) or is a subdomain (relaxed).
DKIM alignment checks if the DKIM signature domain matches the From domain (strict) or is a subdomain (relaxed).
For DMARC to pass, either SPF or DKIM must pass AND align with the From domain. Learn more about SPF, DKIM, DMARC alignment.
First, ensure SPF and DKIM are properly configured.
Begin with 'none' policy for monitoring: v=DMARC1; p=none; rua=mailto:dmarc@example.com
Publish the DMARC record as a TXT record in DNS at: _dmarc.example.com
Monitor DMARC reports to understand authentication results and email sending activity.
After verifying authentication, progress to 'quarantine' policy: v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com
Once confident in authentication, move to 'reject' policy: v=DMARC1; p=reject; rua=mailto:dmarc@example.com
Use our DMARC lookup tool and authentication checker to verify DMARC is working correctly.