Skip to content

DMARC Records

DMARC (Domain-based Message Authentication, Reporting, and Conformance) helps protect your domain from email spoofing and provides visibility into email authentication results. Setting up DMARC is now recommended for all domains to improve email deliverability and security.

Quick Setup: Safe DMARC Record for Everyone

If you want a simple, safe DMARC record that won't affect your email delivery and doesn't require dealing with reports, use this:

Type: TXT
Host: _dmarc
Value: v=DMARC1; p=none; sp=none; adkim=r; aspf=r;

This configuration:

  • Doesn't affect mail delivery (p=none)
  • Doesn't generate any reports to manage
  • Applies relaxed alignment for both DKIM and SPF
  • Signals to email providers that you care about email authentication

Understanding DMARC Components

DMARC records consist of several parts:

TagNameDescription
vVersionAlways set to DMARC1
pPolicyWhat to do with messages that fail authentication
ruaReporting URI for Aggregate reportsWhere to send summary reports
rufReporting URI for Forensic reportsWhere to send detailed failure reports
spSubdomain PolicyPolicy for subdomains
adkimDKIM Alignment ModeStrict or relaxed
aspfSPF Alignment ModeStrict or relaxed
pctPercentPercentage of messages subject to filtering

Policy Options Explained

The policy tag (p=) is the most important part of your DMARC record:

  • p=none: Monitor only - emails that fail DMARC will still be delivered
  • p=quarantine: Suspicious emails may be sent to spam folder
  • p=reject: Emails that fail DMARC should be blocked
  1. Start with basic policy (p=none) without reporting
  2. Ensure proper SPF and DKIM configuration
  3. If you want to advance your email security:
    • Add reporting (optional) by adding rua=mailto:youremail@example.com
    • Review reports for at least 2-4 weeks to identify legitimate mail sources
    • Move to p=quarantine with a low percentage (pct=10) when ready
    • Increase percentage as you confirm legitimate email is passing
    • Eventually move to p=reject when confident

Advanced DMARC Examples

Monitoring Only

v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com; ruf=mailto:dmarc-forensic@yourdomain.com; fo=1;

Partial Quarantine

v=DMARC1; p=quarantine; pct=25; rua=mailto:dmarc@yourdomain.com; ruf=mailto:dmarc-forensic@yourdomain.com;

Full Enforcement

v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com; ruf=mailto:dmarc-forensic@yourdomain.com; fo=1; adkim=s; aspf=s;

Important Notes

  • Start cautiously with p=none to avoid disrupting legitimate email
  • Reporting is optional but helpful if you want to advance to stricter policies
  • DMARC requires proper SPF and DKIM setup to be fully effective
  • Test thoroughly before moving to stricter policies

Report Handling (Optional)

If you decide to use reporting (rua= tag), be aware that the reports:

  • Are XML files which aren't easy to read
  • Can quickly fill up an inbox
  • Require technical knowledge to interpret

⚠️ Important Warning: Google doesn't accept forwarded DMARC reports from themselves. Do not have DMARC reports sent to an email address that forwards to Gmail, as this increases delivery failure statistics for your domain and MXroute's IPs.

If you still want to use reports, you can:

  1. Set up a dedicated mailbox for DMARC reports (not forwarded to Gmail)
  2. Use a DMARC report analyzer service
  3. Forward reports to a non-Google service that provides readable summaries

Prerequisites

For DMARC to work effectively, you should first implement:

  • SPF Records for your domain
  • DKIM signing for your outgoing email

These authentication methods provide the foundation for DMARC to work properly.

Who needs a footer?