What is DMARC and Why Does Your Domain Need It?

What is DMARC?

DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. In plain English, it is a rule you publish in your domain's DNS settings that tells email providers like Gmail, Outlook, and Yahoo what to do when someone tries to send an email pretending to be from your domain.

Every day, billions of emails are sent by scammers who forge the "From" address to make their messages look like they come from a trusted business. This is called email spoofing, and it is one of the most common methods behind phishing attacks, invoice fraud, and brand impersonation. DMARC was created specifically to fight this problem.

Without DMARC, anyone on the internet can send an email that appears to come from your domain. Your customers, vendors, and employees have no reliable way to tell the difference between a real message from you and a fake one. With a DMARC policy in place, you instruct email providers to check every message claiming to be from your domain and either allow it, send it to spam, or block it entirely.

DMARC does not work alone. It builds on two older email authentication technologies — SPF and DKIM — and adds a policy layer and reporting mechanism on top. Think of DMARC as the coordinator that ties the entire email authentication system together.

How DMARC Works with SPF and DKIM

Email authentication relies on three technologies working together. Each handles a different piece of the puzzle:

SPF (Sender Policy Framework)

SPF is a DNS record that lists every server and IP address authorized to send email on behalf of your domain. When an email arrives, the receiving server looks up your SPF record and checks whether the sending server is on the approved list. If it is not, the message fails the SPF check.

The limitation of SPF is that it only verifies the envelope sender (the technical return address), not the "From" address that the recipient actually sees. A scammer can pass SPF by using their own server while still forging your domain in the visible "From" field.

DKIM (DomainKeys Identified Mail)

DKIM adds a cryptographic digital signature to outgoing emails. The sending server signs the message with a private key, and the receiving server verifies it using a public key published in your DNS. If the signature matches, the recipient knows the email was not altered in transit and that it was genuinely sent by a server with access to your private key.

DKIM proves that the message content is authentic, but on its own it does not tell the receiving server what to do if the signature is missing or invalid.

DMARC: The Policy Layer

DMARC ties SPF and DKIM together with two critical additions. First, it introduces alignment — the requirement that the domain in the visible "From" header must match the domain verified by SPF or DKIM. This closes the loophole that SPF alone leaves open. Second, DMARC publishes a policy that tells receiving servers exactly what action to take when a message fails authentication: do nothing, quarantine it, or reject it outright.

On top of that, DMARC enables reporting. Email providers send you data about every message they receive that claims to be from your domain, so you can see who is sending mail as you — both legitimate services and unauthorized senders.

Simple analogy

SPF is the guest list at the door — it says which servers are allowed in. DKIM is the ID check — it proves the message is real and unaltered. DMARC is the bouncer's instructions — it tells the door staff what to do when someone fails the guest list or the ID check.

Why DMARC Matters for Your Business

If you own a domain and send email — whether that is newsletters, invoices, support tickets, or even just password resets — DMARC is not optional anymore. Here is why:

DMARC Policies Explained

Your DMARC record includes a policy tag (p=) that determines what happens to emails that fail authentication. There are three levels, and you should work through them in order:

p=none Monitor Only

No action is taken on failing emails. Messages are delivered normally regardless of authentication results. You receive reports so you can see who is sending as your domain and whether your legitimate email is passing SPF and DKIM. This is the recommended starting point.

No protection — observation mode
p=quarantine Send to Spam

Emails that fail DMARC checks are flagged as suspicious and typically routed to the recipient's spam or junk folder. Legitimate senders that are not properly authenticated will also be affected, so only move to this level after reviewing your reports and confirming your authorized senders pass.

Partial protection
p=reject Block Entirely

Emails that fail DMARC checks are rejected outright and never reach the recipient. This is the strongest level of protection and the ultimate goal of any DMARC deployment. It completely prevents unauthorized parties from delivering email using your domain.

Full protection — recommended goal

Most organizations should start with p=none, spend a few weeks reviewing reports to confirm that all legitimate email is properly authenticated, then move to p=quarantine, and finally to p=reject. Skipping straight to reject without monitoring first can cause legitimate email to be blocked.

How to Check Your DMARC Status

Checking whether your domain has a DMARC record is straightforward. Your DMARC record is a DNS TXT record published at _dmarc.yourdomain.com. A typical record looks like this:

v=DMARC1; p=reject; rua=mailto:dmarc-reports@yourdomain.com; pct=100; adkim=s; aspf=s

Here is what each part means:

The fastest way to check your domain is to use our free DMARC Checker tool. Enter your domain name, and it will instantly tell you whether a DMARC record exists, what policy is set, and whether there are any configuration issues.

How to Set Up DMARC — Step by Step

Setting up DMARC does not require deep technical knowledge, but it does require a methodical approach. Follow these steps to get it right:

  1. Verify that SPF and DKIM are already in place. DMARC depends on SPF and DKIM to function. Before creating a DMARC record, confirm that your domain has a valid SPF record and that your email provider has enabled DKIM signing. You can use our SPF Checker to verify your SPF configuration.
  2. Start with a monitoring-only policy (p=none). Your first DMARC record should use p=none so you can observe who is sending email as your domain without affecting delivery. This lets you catch any legitimate services you may have overlooked.
  3. Create the DNS TXT record. Log in to your DNS provider (such as Cloudflare, Namecheap, GoDaddy, or Route 53) and create a new TXT record with the following values:
    Host / Name: _dmarc Type: TXT Value: v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com
    Replace dmarc@yourdomain.com with a real email address where you want to receive reports. Some providers require you to enter _dmarc.yourdomain.com as the full hostname — check your provider's documentation.
  4. Monitor aggregate reports for 2–4 weeks. Once your record is published, email providers will begin sending XML reports to the address you specified. These reports contain data about every email sent using your domain. Review them to identify all legitimate senders and confirm they pass SPF or DKIM alignment. If you find services that are failing, update their SPF or DKIM configuration before moving to a stricter policy.
  5. Move to p=quarantine. After confirming that all your authorized senders are passing authentication, update your DMARC policy to p=quarantine. This sends unauthorized emails to spam while you continue to monitor for any issues.
  6. Upgrade to p=reject for full protection. Once you are confident that no legitimate email is being caught, change your policy to p=reject. This is the strongest level of protection and the recommended end state for every domain. Unauthorized emails will be blocked entirely and never reach your recipients.

The entire process from initial setup to full enforcement typically takes 4 to 8 weeks, depending on how many third-party services send email on your behalf and how quickly you can resolve any authentication gaps.

DMARC Reports: Understanding the Data

One of the most valuable features of DMARC is the reporting mechanism. There are two types of reports:

Aggregate Reports (rua)

Aggregate reports are XML files sent by email providers (usually once per day) to the address specified in your DMARC record's rua tag. They contain summary data about all email sent using your domain, including:

These reports are essential for understanding your email ecosystem. They reveal legitimate services you may have forgotten about, unauthorized senders attempting to spoof your domain, and configuration issues that need to be fixed before you can safely enforce a stricter policy.

Forensic Reports (ruf)

Forensic reports are detailed, per-message reports sent when an individual email fails DMARC. They can include headers or even the full body of the failing message, which helps you investigate specific spoofing attempts. However, many email providers do not send forensic reports due to privacy concerns, so aggregate reports are the primary data source most organizations rely on.

Raw DMARC XML reports are not easy to read. Tools and services that parse and visualize these reports make the data far more actionable. GuardHound's monitoring features help you make sense of your DMARC data without manually processing XML files.

How GuardHound Monitors Your DMARC

Setting up DMARC is not a one-time task. DNS records can be accidentally deleted, third-party services change their sending infrastructure, and attackers constantly probe for weaknesses. Ongoing monitoring ensures your protection stays intact.

GuardHound helps you stay on top of your DMARC configuration with:

Check Your Domain's DMARC Right Now

Find out if your domain is protected from email spoofing. Our free tools give you instant results with actionable recommendations.

Frequently Asked Questions

Do I need DMARC if I already have SPF?

Yes. SPF alone only verifies which servers are allowed to send mail for your domain, but it does not tell receiving servers what to do when the check fails. It also does not check that the visible "From" address matches the authenticated domain. DMARC adds the policy layer (block, quarantine, or allow) and requires alignment between the "From" address and the domain authenticated by SPF or DKIM. Without DMARC, a spoofed email can still reach inboxes even if SPF fails.

Will DMARC break my email sending?

Not if you roll it out carefully. Start with a p=none policy, which monitors email without taking any action on failing messages. Review the aggregate reports for 2 to 4 weeks to identify every legitimate service sending email on your behalf — marketing platforms, help desks, CRMs, billing systems, and so on. Make sure each one passes SPF or DKIM alignment before you move to quarantine or reject. This gradual approach ensures your legitimate email is never disrupted.

How long does it take to set up DMARC?

The initial DNS record can be created in under five minutes. However, the full deployment from p=none to p=reject typically takes 4 to 8 weeks. The time is spent monitoring aggregate reports, identifying all legitimate senders, and ensuring SPF and DKIM are correctly configured for every service before you enforce a strict policy. The DNS record itself propagates within minutes to a few hours depending on your provider.

What are DMARC aggregate reports?

Aggregate reports (specified by the rua tag in your DMARC record) are XML files that email providers send to you, usually once per day. They summarize all email activity for your domain: which IP addresses sent messages, whether each message passed SPF and DKIM, whether alignment was met, and what policy was applied. These reports are the primary tool you use to understand your email ecosystem and verify that legitimate senders are properly authenticated before enforcing a stricter policy.

Is DMARC required by Google and Yahoo?

Yes. Since February 2024, both Google and Yahoo require all bulk email senders (those sending 5,000 or more messages per day) to publish a valid DMARC record. For smaller senders, DMARC is strongly recommended and is used as a positive deliverability signal. Microsoft, Apple, and other major providers also use DMARC in their filtering decisions. Having a properly configured DMARC record with an enforcement policy improves your chances of reaching the inbox across all providers.