Categories
DMARC

DMARC

DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is one of the most important technical concepts in email deliverability and domain protection. It is also one of the most misunderstood. In practice, DMARC is not “magic” and it is not just another random DNS detail. It is a policy published in DNS that tells receiving mail servers what to do with messages that claim to come from your domain but do not pass authentication checks in the right relationship to the visible From domain.

If you send newsletters, direct mail, automated campaigns, transactional messages or ordinary company email from your own domain, sooner or later DMARC becomes very hard to ignore. It helps receiving systems recognise whether an email really matches the domain identity it presents to the user. It also gives domain owners visibility through reports, which makes it easier to see who is really sending on behalf of the domain and where weak spots still exist in the sending setup.

DMARC is a DNS-based email policy that helps prevent domain spoofing. It tells receiving servers how to handle messages that appear to come from your domain but fail authentication checks tied to the visible From address. At the same time, it can send reports that help you understand what is really being sent in your domain’s name.

What DMARC is and why people talk about it so much

Interest in DMARC has grown because SPF and DKIM alone are not always enough. You can have both configured and still leave room for confusion if the authenticated domain does not properly match the domain the user sees in the From field.

This is where DMARC brings order. It does not only ask whether a server was allowed to send a message or whether a message was signed. It also asks whether the authentication result actually makes sense in relation to the domain identity shown to the recipient.

That matters mainly because of spoofing, phishing and brand impersonation. If someone tries to send forged email in your domain’s name, DMARC is one of the main ways to tell receiving servers not to treat those messages as normal mail.

In practical terms, DMARC is especially important for:

  • companies sending newsletters and marketing campaigns,
  • e-commerce businesses using transactional and automated email,
  • brands that want to reduce the risk of domain abuse,
  • organisations working on deliverability and sender reputation,
  • senders with larger mail volumes who need to meet stricter mailbox-provider expectations.

How DMARC works in principle

DMARC builds on the results of SPF and DKIM, but adds one more condition that is easy to underestimate – alignment. This is the key difference between a simplified explanation and how DMARC really works.

It does not merely check whether SPF or DKIM passed in some technical sense. It checks whether the domain validated by SPF or DKIM is aligned with the domain shown in the From header that the recipient actually sees.

In simplified form, the process looks like this:

  1. the message arrives at the receiving mail server,
  2. the server evaluates SPF and DKIM,
  3. DMARC checks whether the SPF-authenticated or DKIM-authenticated domain aligns with the domain in the From field,
  4. if at least one aligned result passes, the message can pass DMARC,
  5. if not, the receiver looks at the DMARC record of the domain owner to decide how the message should be handled.

This is exactly why DMARC helps against domain impersonation. It is not enough for a message to be signed by some domain or sent from some technically allowed server. The authenticated identity also has to make sense in relation to the visible sender domain.

Important practical point: DMARC does not automatically guarantee inbox placement. It mainly helps with domain authentication, anti-spoofing and sender identity control. Deliverability still depends on other factors such as reputation, list quality, content, complaint rates and recipient behaviour.

What DMARC depends on – SPF, DKIM and alignment

DMARC does not stand on its own. It is a layer built on top of SPF and DKIM. If you have not clearly defined which servers may send on behalf of your domain, or if your messages are not being signed correctly, DMARC has very little solid information to work with.

A useful way to think about the relationship is this:

  • SPF says which servers are allowed to send email for your domain,
  • DKIM proves that the message was signed by an authorised domain and was not materially altered in transit,
  • DMARC checks whether the authenticated result from SPF or DKIM aligns with the domain in the visible From field and defines what should happen if it does not.

In practice, alignment is where many organisations get surprised. A message may “pass something” technically and still fail DMARC because the relationship between the authenticated domain and the visible sender domain does not line up properly.

That is one of the main reasons why DMARC deployments sometimes fail on the first attempt – not because DMARC is inherently mysterious, but because it reveals hidden inconsistencies in the sending infrastructure.

Where DMARC is published and what it looks like

DMARC is published in DNS as a TXT record, usually on the _dmarc subdomain of the main sending domain.

A simple example looks like this:

v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com;

It may look short, but this record is doing several important things at once:

  • it declares that the record is a DMARC policy,
  • it sets the policy level,
  • it tells receiving systems where aggregate reports should be sent,
  • it can control how subdomains are treated,
  • it can define how strict alignment should be.

That is why copying a DMARC record from somewhere else without understanding it is risky. A badly designed DMARC record may not only fail to help. It can also start blocking legitimate messages from tools or services you forgot were sending on behalf of your domain.

What the policies p=none, p=quarantine and p=reject really mean

This is one of the most practical parts of the whole topic. The p= value defines what the receiver should do with messages that fail DMARC.

  • p=none – monitor only. The receiver is asked not to change message handling because of DMARC failure. This is typically used at the start of deployment so you can collect reports and see what your domain is actually doing.
  • p=quarantine – treat failing messages as suspicious. In practice, that often means sending them to spam or another lower-trust location rather than treating them as clean mail.
  • p=reject – ask the receiving server to reject the message outright if it fails DMARC.

These policies are often best understood as stages of maturity rather than as one quick switch. Many teams begin with p=none, use reports to clean up forgotten senders and alignment problems, move to p=quarantine when the setup is more stable, and only later go to p=reject.

Practical guidance – starting directly with a strict policy can be risky if you have not fully mapped all the systems sending mail on behalf of your domain. DMARC becomes much safer when it is rolled out in stages rather than as a one-step enforcement project.

Why reporting is such an important part of DMARC

One of DMARC’s strongest benefits is not only enforcement, but visibility. The record can ask for reports, most often through the rua tag for aggregate reporting and, where supported, ruf for failure-oriented reporting.

That matters because many organisations do not actually know every service that sends email using their domain. Marketing platforms, CRM tools, old servers, ticketing tools, billing systems and third-party apps often accumulate over time.

DMARC reports help uncover that reality. They can show which senders are authenticating properly, which are failing, and which sources may be spoofing or using the domain without correct setup.

In practice, this makes DMARC much more than a blocking mechanism. It becomes a way to audit your real sending landscape and identify where email authentication still needs work.

What else can be configured in a DMARC record

Beyond the core policy, DMARC records can include additional tags that shape how the policy behaves.

  • rua – where aggregate reports should be sent.
  • ruf – where failure reports should be sent, if receivers support them.
  • sp – a policy specifically for subdomains.
  • pct – the percentage of failing mail the policy should apply to, useful for staged rollouts.
  • adkim and aspf – whether DKIM and SPF alignment should be evaluated in relaxed or strict mode.

These details are part of what makes DMARC flexible. But they also make it possible to create a record that looks fine on the surface while behaving differently than intended. That is another reason why DMARC is best implemented with a clear understanding of what each tag is for.

Why DMARC does not solve everything by itself

DMARC is powerful, but it is not a universal email fix.

It does not guarantee inbox placement. It does not fix poor sender reputation. It does not repair broken list hygiene. It does not automatically make recipients trust your emails. And it does not remove every edge case in complex mail flows such as forwarding, mailing lists or older third-party systems that break alignment.

It is better to think of DMARC as a domain identity and anti-spoofing layer. That is already extremely valuable, but it is still only one part of the wider email setup.

What are the limits of DMARC? DMARC helps receivers evaluate whether a message is consistent with your domain identity. It does not tell them whether a message is “good” in every broader sense. Spam reputation, content quality, mailing practices and receiver-side filtering still matter. That is why DMARC should be seen as a critical part of email security and deliverability – but not the whole system.

Where DMARC matters most in practice

DMARC becomes especially important when a domain is used for:

  • marketing and newsletter sending,
  • transactional email from e-commerce or SaaS systems,
  • company mailboxes and day-to-day business communication,
  • brand protection against spoofing and phishing,
  • compliance with stricter expectations from large mailbox providers.

That is why DMARC is not only a technical concern for mail administrators. It also matters to marketers, founders, e-commerce operators and anyone responsible for a domain’s public credibility.

Why this term is worth understanding even outside technical roles

DMARC is one of the clearest examples of the fact that email is not only about writing a message and pressing send. Behind the scenes, there is also identity, trust and policy.

If you understand what DMARC does, it becomes much easier to see why an email may be blocked even though it “looked fine”, why a brand can be impersonated through email if authentication is weak, and why one forgotten sending tool can cause trouble across an entire domain.

That is why DMARC is worth understanding even outside technical professions. It sits exactly at the point where email deliverability, domain protection, sender reputation and brand trust all meet.

Related terms

  • DNS – DMARC is published as a DNS TXT record, so its role only makes full sense in the wider context of how DNS works.
  • SPF – one of the two core authentication methods DMARC builds on.
  • DKIM – the other core authentication method DMARC evaluates together with alignment.
  • Alignment – the rule that checks whether the SPF-authenticated or DKIM-authenticated domain matches the visible From domain closely enough to count as a DMARC pass.
  • From domain – especially important in DMARC because this is the sender identity the human recipient actually sees.
  • TXT record – the DNS record type used to publish DMARC.
  • rua / ruf – DMARC reporting tags used to request aggregate and failure-oriented reports.
  • p=none, p=quarantine, p=reject – the three main DMARC policy levels that define how failing mail should be handled.
  • MX records – not part of DMARC itself, but closely related to the wider email infrastructure of a domain.
  • Nameservers – the authoritative servers that publish the DMARC record and the rest of the domain’s DNS data.

Was this article helpful?

Support us to keep up the good work and to provide you even better content. Your donations will be used to help students get access to quality content for free and pay our contributors’ salaries, who work hard to create this website content! Thank you for all your support!

Reaction to comment: Cancel reply

What do you think about this article?

Your email address will not be published. Required fields are marked.