February 4, 2026 12 min read

What Is DMARC and Why Does It Matter?

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication policy that tells receiving servers how to handle messages that fail SPF or DKIM checks. DMARC is now required for bulk senders by Gmail, Yahoo, and Microsoft. Without it, your emails may be rejected or sent to spam regardless of your other authentication settings.

SPF and DKIM authenticate email, but they do not tell receivers what to do when authentication fails. Should the email be delivered anyway? Sent to spam? Rejected entirely? DMARC answers these questions and adds visibility through reporting.

As of 2024-2025, major mailbox providers require DMARC for anyone sending bulk email. We help organizations implement DMARC correctly, and this guide covers everything you need to know.

How DMARC Works

DMARC builds on SPF and DKIM by adding two critical components:

  1. Policy: Instructions for what receivers should do with failing messages
  2. Reporting: Feedback about who is sending email using your domain

The Authentication Check

For DMARC to pass, at least one of the following must be true:

Alignment means the authenticated domain matches the domain that appears in the visible From address. This prevents attackers from passing SPF or DKIM with their own domains while spoofing your domain in the From header.

DMARC Record Syntax

DMARC is published as a TXT record at _dmarc.yourdomain.com:

v=DMARC1; p=reject; rua=mailto:[email protected]; ruf=mailto:[email protected]; pct=100

Required Tags

Optional Tags

DMARC Policies Explained

p=none (Monitor Only)

No action is taken on failing messages. Use this when first implementing DMARC to collect data without affecting delivery. This policy satisfies Gmail and Yahoo's minimum requirement.

p=quarantine

Failing messages should be treated as suspicious. Most receivers send these to spam. Use this after confirming all legitimate mail passes authentication.

p=reject

Failing messages should be rejected entirely. This provides maximum protection against spoofing. Only implement after thorough testing.

The Path to p=reject

Moving directly to p=reject without proper preparation can block legitimate email. Follow this path: Start with p=none for 2-4 weeks, analyze reports, fix authentication issues, move to p=quarantine for 2-4 weeks, then finally p=reject.

Why DMARC Is Required

Major mailbox providers now require DMARC for bulk senders:

Without DMARC, your emails face increased spam filtering or outright rejection. The minimum acceptable policy is p=none, but providers have signaled they may require stricter policies in the future.

DMARC Alignment

Alignment is the key concept that makes DMARC effective. Without alignment requirements, attackers could pass SPF or DKIM with their own infrastructure while spoofing your domain in the visible From address.

Relaxed vs. Strict Alignment

Most organizations use relaxed alignment, which provides protection while allowing legitimate use of subdomains.

DMARC Reporting

DMARC reports provide visibility into who is sending email using your domain. This is invaluable for identifying unauthorized senders and authentication problems.

Aggregate Reports (rua)

Daily summaries of authentication results from all receiving servers. Shows volume, pass/fail rates, and sending IP addresses. Use these to monitor your email ecosystem.

Forensic Reports (ruf)

Individual message details when authentication fails. Contains more information but raises privacy concerns. Many receivers do not send forensic reports.

Processing DMARC Reports

Raw DMARC reports are XML files that can be difficult to read. Use a DMARC reporting service or tool to aggregate and visualize the data. This makes it much easier to identify issues and track authentication trends.

Implementing DMARC

Step 1: Audit Your Email Sources

List every system that sends email as your domain. This includes marketing platforms, transactional services, CRM systems, and any other tools that send email.

Step 2: Verify SPF and DKIM

Ensure all sending sources pass SPF and DKIM with proper alignment. DMARC cannot pass without at least one aligned authentication method.

Step 3: Publish a p=none Record

v=DMARC1; p=none; rua=mailto:[email protected]

Start monitoring without affecting delivery. Collect reports for at least 2-4 weeks.

Step 4: Analyze Reports

Review aggregate reports to identify authentication failures. Fix any legitimate sources that fail SPF or DKIM alignment.

Step 5: Increase Policy Strength

Once all legitimate email passes, move to p=quarantine, then p=reject. Use the pct tag to gradually increase the percentage of mail affected.

Common DMARC Mistakes

Forgetting Third-Party Senders

Marketing platforms, support systems, and other tools often send email as your domain. If they are not properly authenticated, they fail DMARC. Audit all sending sources before tightening your policy.

Ignoring Subdomains

Without an sp= tag, subdomains inherit your main domain policy. Attackers may spoof unprotected subdomains. Use sp=reject to protect all subdomains, or publish separate DMARC records for subdomains that need different policies.

Not Monitoring Reports

DMARC reports reveal authentication problems and unauthorized senders. Without monitoring, you cannot know if your authentication is working or if someone is spoofing your domain.

Moving to Reject Too Quickly

Implementing p=reject without thorough testing blocks legitimate email. Always start with p=none, analyze reports, and gradually increase policy strength.

Frequently Asked Questions

What does DMARC stand for?
DMARC stands for Domain-based Message Authentication, Reporting and Conformance. It is a protocol that builds on SPF and DKIM to provide a policy framework for email authentication.
Is DMARC required?
Yes, as of 2024, Gmail and Yahoo require DMARC for bulk senders (5,000+ messages per day). Microsoft followed in 2025. Without DMARC, your emails may be rejected or filtered to spam by these major providers.
What DMARC policy should I start with?
Start with p=none to monitor authentication results without affecting delivery. Once you confirm all legitimate email passes authentication, gradually move to p=quarantine, then p=reject for full protection against spoofing.
How do I read DMARC reports?
DMARC aggregate reports are XML files showing authentication results from receiving servers. Use a DMARC reporting service to parse and visualize the data, making it easier to identify authentication failures and unauthorized senders.

Ready to Improve Your Email Deliverability?

SortedIQ helps high-volume senders maximize inbox placement and sender reputation.

Talk to Our Team