Skip to main content
Protect your domain reputation today
SimpleDMARC
Enterprise-Grade Security

What Is DMARC?

Domain-based Message Authentication, Reporting, and Conformance — the protocol that stops attackers from sending emails as your domain.

What Is DMARC?

DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It is an open email authentication protocol that gives domain owners the ability to protect their domain from unauthorized use — commonly known as email spoofing.

Email spoofing is one of the most common tactics in phishing attacks. Without DMARC, anyone can send an email that appears to come from your domain, deceiving customers, employees, and partners. DMARC solves this by building on two existing authentication standards — SPF and DKIM — and adding a critical layer: a published policy that tells receiving mail servers what to do when authentication fails.

Published as a DNS TXT record at _dmarc.yourdomain.com, a DMARC record gives you control over how your domain is used in email and provides visibility through aggregate and forensic reports.

How DMARC Works

DMARC does not work alone. It relies on two underlying protocols — SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) — and introduces a concept called alignment to tie everything together.

1. SPF Check

SPF verifies that the sending server's IP address is authorized to send mail for the domain. The receiving server looks up the SPF record in DNS and checks whether the sending IP is listed. DMARC then checks whether the domain in the SPF record aligns with the domain in the email's "From" header.

2. DKIM Check

DKIM attaches a cryptographic signature to outgoing emails. The receiving server retrieves the public key from the sender's DNS and verifies the signature, confirming that the message was not altered in transit. DMARC then verifies that the DKIM signing domain aligns with the "From" domain.

3. Alignment

Alignment is the key innovation of DMARC. For a message to pass DMARC, either SPF or DKIM must not only pass their own checks, but the domain they authenticate must also match (or align with) the domain shown in the visible "From" header. This prevents attackers from passing SPF or DKIM with their own domain while forging your domain in the "From" field.

4. Policy Application

If neither SPF nor DKIM passes with proper alignment, the receiving server applies the policy specified in your DMARC record. This determines whether the email is delivered, quarantined, or rejected outright.

The Three DMARC Policies

The p= tag in your DMARC record defines the enforcement policy. There are three levels, each representing a different level of protection:

👁️

p=none

Monitor only. No action is taken on failing emails. This is the starting point for collecting data and understanding your email ecosystem before enforcing restrictions.

⚠️

p=quarantine

Suspicious emails go to spam. Emails that fail authentication are delivered to the recipient's spam or junk folder, reducing their visibility while allowing you to review potential false positives.

🛡️

p=reject

Unauthorized emails are blocked. Emails that fail DMARC are completely rejected and never reach the recipient. This is the strongest protection against domain spoofing.

DMARC Reporting

One of DMARC's most powerful features is its reporting mechanism. DMARC generates two types of reports that provide visibility into how your domain is being used in email:

Aggregate Reports (RUA)

Sent daily in XML format, aggregate reports provide a statistical overview of all email traffic using your domain. They show which IP addresses are sending email as your domain, how many messages passed or failed SPF, DKIM, and alignment checks, and which policies were applied. These reports are essential for identifying legitimate senders and detecting unauthorized use.

Forensic Reports (RUF)

Forensic reports provide real-time, message-level details about individual emails that fail DMARC authentication. They include headers and metadata from the failed message, allowing you to investigate specific spoofing attempts. Note that not all mailbox providers send forensic reports due to privacy considerations.

Why DMARC Matters Now

DMARC adoption has become increasingly urgent. In February 2024, Google and Yahoo began enforcing new requirements for bulk email senders. Domains sending over 5,000 messages per day must have a valid DMARC record published. Without it, emails may be throttled, sent to spam, or outright rejected.

Microsoft has since announced similar requirements for Outlook.com domains. The message from major mailbox providers is clear: DMARC is no longer optional for organizations that rely on email for communication, marketing, or transactional purposes.

Beyond compliance, DMARC protects your brand reputation. When attackers send phishing emails using your domain, it erodes trust with your customers and partners. DMARC enforcement ensures that only authorized senders can use your domain, preserving the integrity of your brand in every inbox.

Getting Started with DMARC

Implementing DMARC is a journey that typically follows four phases:

  1. Publish a DMARC record with p=none — Start monitoring without affecting email delivery. Use our DMARC Generator to create your record.
  2. Analyze your reports — Review aggregate reports to identify all legitimate senders and fix SPF/DKIM alignment issues. SimpleDMARC converts raw XML reports into clear, actionable dashboards.
  3. Move to p=quarantine — Once you have identified and authorized all legitimate senders, tighten the policy. Unauthorized emails will be sent to spam.
  4. Enforce with p=reject — The final step. All emails that fail DMARC are blocked before reaching the recipient. Your domain is now fully protected from spoofing.

Ready to Protect Your Domain?

Start with a free DMARC check to see where your domain stands today.

Check Your Domain Now

Frequently Asked Questions

Do I need both SPF and DKIM for DMARC?
DMARC requires at least one of SPF or DKIM to pass with proper alignment. However, best practice is to implement both for maximum protection. If one mechanism fails, the other can still authenticate the message.
What is DMARC alignment?
Alignment means the domain used by SPF or DKIM matches the domain in the visible "From" header. Without alignment, an attacker could pass SPF or DKIM using their own domain while forging yours in the "From" field. DMARC supports both strict alignment (exact domain match) and relaxed alignment (organizational domain match).
Is DMARC free to set up?
Yes, publishing a DMARC record is completely free — it is simply a DNS TXT record. However, to properly analyze the reports and manage enforcement, most organizations use a DMARC management platform like SimpleDMARC for visibility and automation.
Can DMARC break my email delivery?
If you jump straight to p=reject without first analyzing your senders, legitimate emails from third-party services (like marketing platforms or CRMs) may be blocked. This is why the recommended approach is to start with p=none, identify all authorized senders, fix alignment issues, and then gradually increase enforcement.
What is the difference between DMARC and email encryption?
DMARC and email encryption solve different problems. DMARC verifies the identity of the sender and prevents domain spoofing. Email encryption (like TLS or S/MIME) protects the content of the message from being read during transit. Both are important, but they serve complementary purposes.
What is DMARC? Complete Guide to Email Authentication | SimpleDMARC