DMARC is where email authentication becomes operational policy. SPF and DKIM tell receivers what passed. DMARC tells receivers what to do when alignment fails and where to send reports.
If your team is searching for , , or , this guide breaks the record into practical pieces and shows how to use each one in production.
DMARC record format
A DMARC record is a DNS TXT value published at:
Basic example:
Required DMARC tags
(version)
- Must be
- Must appear first
(policy)
Defines handling for mail that fails DMARC alignment:
: monitor only: send suspicious mail to junk/quarantine handling: reject non-aligned mail at SMTP stage
Highly recommended tags
Aggregate report destination. This is essential for visibility while tuning authentication.
Example:
Failure reporting preference (provider support varies):
: report only when both SPF and DKIM fail (default): report when either auth mechanism fails alignment: DKIM-specific failure detail: SPF-specific failure detail
Optional tags you should understand
Subdomain policy override. Use when parent and subdomains require different enforcement levels.
and
Alignment strictness:
relaxed (default)strict
Percentage of failing messages subject to policy. Useful for staged rollout.
and
Forensic/failure report destination and format. Availability depends on mailbox providers.
Requested aggregate reporting interval in seconds (default often daily).
DMARC policy rollout model
A safe progression for most teams:
withenabled- Fix major SPF/DKIM alignment failures
- Increase confidence with stable reporting windows
- Move to
in controlled stages (optional) - Move to
once legitimate traffic is consistently aligned
This sequence reduces the risk of blocking legitimate transactional email during migrations.
How to read a DMARC report quickly
When reviewing aggregate reports, focus on:
- Source IPs and send volumes
- SPF pass/fail and DKIM pass/fail by source
- Alignment outcomes relative to your From domain
- Unknown senders using your domain
Use this data to classify sources into:
- Authorized and healthy
- Authorized but misconfigured
- Unauthorized and suspicious
After classification, feed fixes into your sender routing and DNS ownership process.
Common DMARC mistakes
- Enforcing
before alignment cleanup - Missing
, leaving no feedback loop - Using strict alignment without validating subdomain senders
- Forgetting cross-region or third-party sender paths
- Treating DMARC as set-and-forget instead of monitored controls
Practical verification workflow
- Validate syntax with DMARC record validator.
- Confirm policy visibility with DMARC checker.
- Verify DKIM/SPF health using DKIM checker and SPF tools.
- Run a release-gate validation through Email deliverability test.
- Track weekly report deltas in your deliverability ops cadence.
Final takeaway
DMARC tags are small, but policy impact is large. Strong results come from staged enforcement, report-driven tuning, and clear ownership over all sending systems that can represent your domain.