DMARC
DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication protocol that builds on SPF and DKIM by specifying what receiving mail servers should do when an email fails authentication checks — reject it, quarantine it, or allow it through — and by sending reports back to the domain owner about authentication outcomes.
What should I know about DMARC?
Three Policy Levels: None, Quarantine, Reject
p=none monitors without action, making it ideal for initial deployment. p=quarantine sends failing emails to spam. p=reject blocks failing emails entirely. Moving from none to reject over time is the recommended path to full protection.
DMARC Reports Show What Is Being Sent in Your Name
Daily aggregate DMARC reports reveal every IP address claiming to send email from your domain and whether those emails are passing or failing authentication — surfacing both misconfiguration and spoofing attempts.
DMARC Alignment Closes the SPF Spoofing Gap
DMARC requires that the visible From address aligns with the domain that passed SPF or DKIM. Without this alignment check, attackers can pass SPF by sending from an authorized server while displaying a spoofed address to recipients.
How is DMARC used in practice?
A team deploys DMARC in stages. Month 1: v=DMARC1; p=none; rua=mailto:dmarc@company.com — monitoring only. They review aggregate reports weekly and fix authentication failures in their sending tools. Month 2: p=quarantine; pct=25 — quarantine failing emails for 25% of traffic while monitoring the impact. Month 3: p=reject — full enforcement after confirming all legitimate senders are passing correctly.
A company receives their weekly DMARC aggregate report and notices an unfamiliar IP address in Brazil sending thousands of emails claiming to be from their domain. Because their DMARC policy is set to p=reject, those spoofed emails are being blocked by receiving servers. Without DMARC, those spoofed emails would have been delivered, potentially damaging their domain's sender reputation.
Frequently asked questions
What is the minimum DMARC policy required by Google and Yahoo?
Google and Yahoo's 2024 requirements mandate a DMARC policy of at least p=none for all bulk senders (over 5,000 emails per day). While p=none provides no active enforcement, it satisfies the requirement and is the starting point before moving to quarantine or reject.
What is the difference between RUA and RUF DMARC reports?
RUA (aggregate) reports are daily summaries of all email authentication outcomes for your domain, showing sending sources, pass/fail rates, and volumes. RUF (forensic) reports are sent for individual failures and include headers from the failing email. RUA reports are always recommended; RUF reports are optional and contain more sensitive data.
How long does DMARC take to implement fully?
Publishing the initial DMARC DNS record takes minutes. Analyzing reports, fixing authentication issues across all sending sources, and gaining confidence to move to p=reject typically takes 4-8 weeks for organizations with multiple email service providers and complex sending infrastructure.
Learn more
Protect Your Domain While Scaling Video Outreach
Outvid pairs personalized AI video with deliverability best practices — including guidance on DMARC, SPF, and DKIM — so your outreach reaches inboxes at scale.