What is DMARC? The Complete Guide to Email Authentication

15 min read

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that protects your domain from email spoofing, phishing attacks, and business email compromise (BEC).

Built on top of SPF and DKIM, DMARC provides domain owners with the ability to protect their domain from unauthorized use and gain visibility into who is sending email on their behalf.

How DMARC Works

DMARC works by checking if incoming email messages align with SPF and/or DKIM authentication mechanisms. When an email is received, the recipient's mail server performs these authentication checks:

  1. SPF Check: Verifies that the sending IP address is authorized to send email for the domain
  2. DKIM Check: Validates the cryptographic signature attached to the email
  3. DMARC Alignment: Ensures the "From" domain aligns with either SPF or DKIM authentication
  4. Policy Application: Applies the domain owner's DMARC policy (none, quarantine, or reject)
  5. Reporting: Sends aggregate (RUA) and forensic (RUF) reports back to the domain owner

Example DMARC Record

v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com; ruf=mailto:dmarc@example.com; sp=quarantine; adkim=s; aspf=s; pct=100;

The Three Pillars of Email Authentication

SPF

Sender Policy Framework specifies which IP addresses are authorized to send email for your domain. It's like a whitelist of approved senders.

DKIM

DomainKeys Identified Mail adds a cryptographic signature to email headers, proving the message came from your domain and hasn't been tampered with.

DMARC

DMARC ties SPF and DKIM together, providing alignment checks and giving domain owners control over what happens to unauthenticated email.

DMARC Policy Options

p=none (Monitor)

No action is taken on emails that fail DMARC authentication. This policy is used for monitoring and gaining visibility into your email ecosystem without impacting email delivery.

p=quarantine (Quarantine)

Emails that fail DMARC authentication are sent to the spam/junk folder. This provides protection while allowing recipients to check quarantined messages for false positives.

p=reject (Reject)

Emails that fail DMARC authentication are rejected outright and never reach the recipient's inbox. This provides the strongest protection but requires careful implementation.

Why DMARC is Essential

Email Security Threats

  • Phishing Attacks: Criminals impersonate your domain to steal credentials
  • Business Email Compromise: Sophisticated attacks targeting executives and finance teams
  • Brand Impersonation: Unauthorized use of your domain damages customer trust
  • Email Spoofing: Attackers send malicious emails appearing to come from your domain

DMARC Benefits

  • Prevents domain spoofing and phishing attacks
  • Improves email deliverability and sender reputation
  • Provides detailed reporting on email authentication results
  • Protects brand reputation and customer trust
  • Reduces false positives in spam detection
  • Enables gradual policy deployment

DMARC Implementation Steps

1

Audit Current Email Infrastructure

Identify all systems sending email on behalf of your domain, including third-party services.

2

Configure SPF Records

Create and publish SPF records that authorize all legitimate sending sources.

3

Implement DKIM Signing

Enable DKIM signing for all outbound email streams and publish public keys in DNS.

4

Deploy DMARC with p=none

Start with a monitoring policy to gather data without impacting email delivery.

5

Analyze DMARC Reports

Review RUA and RUF reports to understand authentication results and identify issues.

6

Gradually Enforce Policy

Move from p=none to p=quarantine to p=reject as authentication rates improve.

DMARC Record Components Explained

TagDescriptionValues
vDMARC versionDMARC1
pPolicy for domainnone, quarantine, reject
ruaAggregate report URImailto:dmarc@example.com
rufForensic report URImailto:dmarc@example.com
spSubdomain policynone, quarantine, reject
adkimDKIM alignment moder (relaxed), s (strict)
aspfSPF alignment moder (relaxed), s (strict)
pctPercentage of messages to apply policy1-100

Common DMARC Mistakes to Avoid

  • Jumping to p=reject too quickly: Always start with p=none and analyze reports first
  • Incomplete SPF records: Missing legitimate sending sources will cause DMARC failures
  • Ignoring third-party senders: Ensure all email service providers are properly configured
  • Not monitoring reports: DMARC reports provide valuable insights that must be analyzed
  • Incorrect alignment modes: Understand the difference between relaxed and strict alignment
  • Missing DKIM signatures: Ensure all email streams are DKIM signed

DMARC Reporting and Analysis

DMARC provides two types of reports that give you visibility into how your domain is being used:

RUA Reports (Aggregate)

  • Daily XML reports with statistical data
  • Authentication results summary
  • Source IP addresses and message volumes
  • SPF and DKIM alignment information
  • Policy disposition actions

RUF Reports (Forensic)

  • Real-time failure notifications
  • Individual message samples
  • Detailed authentication failure reasons
  • Message headers and content
  • Privacy considerations required

Getting Started with DMARC

Ready to implement DMARC for your domain? Here are some helpful resources to get you started:

Simplify DMARC Implementation

Get automated DMARC monitoring, expert guidance, and comprehensive reporting with DMARC Shield.