February 4, 2026 9 min read

What DMARC Policy Should I Use?

Start with p=none to monitor authentication results without affecting delivery. After 2-4 weeks of clean reports, move to p=quarantine, then ultimately to p=reject for maximum protection. Never jump directly to p=reject without thorough testing, as this can block legitimate email from misconfigured sending sources.

DMARC offers three policies that determine what happens when email fails authentication. Choosing the right policy depends on where you are in your email authentication journey. This guide explains each policy and provides a roadmap for safe implementation.

The Three DMARC Policies

p=none (Monitor Only)

v=DMARC1; p=none; rua=mailto:[email protected]

With p=none, receivers take no action on failing emails. They deliver messages regardless of authentication results but send you reports about authentication outcomes.

Use p=none when:

Important: p=none satisfies Gmail and Yahoo's minimum DMARC requirement for bulk senders.

p=quarantine (Mark as Suspicious)

v=DMARC1; p=quarantine; rua=mailto:[email protected]

With p=quarantine, receivers treat failing emails as suspicious. Most deliver them to spam folders rather than the inbox.

Use p=quarantine when:

p=reject (Block Completely)

v=DMARC1; p=reject; rua=mailto:[email protected]

With p=reject, receivers should refuse delivery of failing emails entirely. The message never reaches the recipient.

Use p=reject when:

The Safe Path to p=reject

Rushing to p=reject without proper preparation blocks legitimate email. Follow this proven progression:

Phase 1: Monitor (2-4 weeks)

  1. Publish v=DMARC1; p=none; rua=mailto:[email protected]
  2. Collect and analyze aggregate reports
  3. Identify all sources sending email as your domain
  4. Fix SPF and DKIM for any legitimate sources that fail

Phase 2: Quarantine Gradually (2-4 weeks)

  1. Move to p=quarantine; pct=10 (affects 10% of failing mail)
  2. Monitor for delivery problems
  3. Increase pct to 25, then 50, then 100
  4. Continue monitoring reports for failures

Phase 3: Reject (ongoing)

  1. Move to p=reject; pct=10
  2. Gradually increase to pct=100
  3. Continue monitoring reports
  4. Maintain SPF/DKIM for all sending sources

The pct Tag Is Your Safety Net

The pct tag lets you apply your policy to only a percentage of failing email. Start with pct=10 and increase gradually. This limits the impact if you have overlooked a legitimate sending source.

What About Subdomains?

By default, subdomains inherit the main domain's DMARC policy. Use the sp= tag to set a different policy for subdomains:

v=DMARC1; p=reject; sp=quarantine; rua=mailto:[email protected]

This applies p=reject to the main domain but p=quarantine to all subdomains.

Alternatively, publish separate DMARC records at specific subdomains that need different treatment.

Factors to Consider

Email Complexity

Organizations with many email sending sources (marketing, transactional, support, etc.) need more time in each phase to ensure everything is properly authenticated.

Spoofing Risk

High-profile brands and financial institutions face more spoofing attempts. Faster progression to p=reject provides better protection, but only after authentication is solid.

Email Forwarding

If many of your recipients forward email (common in organizations with mailing lists or forwarding addresses), p=reject may cause legitimate mail to be blocked. Monitor forwarding failures in your DMARC reports.

Common Mistakes

Jumping to p=reject

Implementing p=reject without proper testing blocks legitimate email. Always start with p=none and progress gradually.

Ignoring Reports

DMARC reports tell you what is failing. Without reviewing them, you cannot know if legitimate email is affected.

Forgetting Subdomains

Without an sp= tag or subdomain-specific records, subdomains inherit your main policy. Attackers often spoof unprotected subdomains.

Never Moving Beyond p=none

p=none provides no protection against spoofing. It only monitors. To actually protect your domain, you must eventually move to p=quarantine or p=reject.

Frequently Asked Questions

Is p=none enough for Gmail and Yahoo?
Yes, p=none satisfies the current minimum DMARC requirement for bulk senders to Gmail and Yahoo. However, providers may require stricter policies in the future, and p=none does not protect your domain from spoofing.
How long should I stay at each policy level?
Most organizations spend 2-4 weeks at p=none, 2-4 weeks at p=quarantine, then move to p=reject. Complex email environments may need longer at each stage. The key is analyzing reports and confirming all legitimate mail passes before progressing.
Can I go back to p=none after setting p=reject?
Yes, you can change your DMARC policy at any time by updating your DNS record. If you encounter problems with p=reject, you can temporarily revert to p=quarantine or p=none while you resolve the issues.

Ready to Improve Your Email Deliverability?

SortedIQ helps high-volume senders maximize inbox placement and sender reputation.

Talk to Our Team