DMARC policy tells receiving mail systems what to do when a message fails DMARC evaluation. The most common options are , , and .
If you are searching for , , or , this guide focuses on the decision framework, not only the syntax.
Quick answer
Use DMARC policy in stages:
when you are monitoring and mapping legitimate senderswhen you are ready to push suspicious mail toward spam or junkwhen you are confident legitimate sources are aligned and unauthorized mail should be blocked
The safe rollout is almost never "publish reject on day one."
What DMARC policy actually controls
DMARC evaluates whether email passed SPF or DKIM in a way that aligns with the visible From domain policy.
When DMARC fails, the policy tells receivers how aggressively to handle the message.
That is why policy changes affect more than security posture. They can also affect:
- customer-facing delivery
- subdomain behavior
- vendor integrations
- incident recovery speed
, , and
Use when you want reporting and visibility without enforcement.
This is the correct starting point when:
- you are still inventorying senders
- multiple platforms send on behalf of the domain
- old systems may still sign or relay mail unexpectedly
Use when you want failing mail treated as suspicious rather than trusted.
This is a useful middle step because it:
- increases protection
- still gives teams space to observe edge cases
- reduces the chance of breaking legitimate mail outright
Use when legitimate mail is known to align correctly and unauthorized mail should be blocked at the receiver level.
This is the strongest posture, but it must be backed by:
- accurate sender inventory
- validated SPF and DKIM alignment
- staged rollout and monitoring
Example DMARC policy record
A basic monitoring-first record often looks like this:
An enforcement-ready version may move closer to:
Do not treat the stricter version as a template to publish immediately. The point is to understand how posture changes as the record evolves.
DMARC policy rollout sequence
Use this order:
- Publish a valid DMARC record with
. - Review aggregate reporting and inventory real senders.
- Fix SPF or DKIM alignment problems.
- Move to
in a controlled change window. - Watch legitimate flows closely.
- Move to
only after confidence is high.
This staged path is safer than trying to enforce immediately.
Policy choice table
| Policy | Receiver behavior | Best use case |
|---|---|---|
| Monitor only | Sender discovery and baseline reporting |
| Treat failures as suspicious | Intermediate rollout after sender cleanup |
| Block failing mail | Mature, validated enforcement posture |
This table is useful because many teams know the syntax but not the operational meaning of each stage.
DMARC tags that matter for policy decisions
Beyond , several tags affect rollout behavior.
Lets you apply the policy to only a percentage of mail. Useful when you want controlled enforcement instead of an all-at-once cutover.
Specifies where aggregate reports should go. This is essential when you are using or validating a rollout.
Specifies failure reporting where supported. Use carefully because failure-report behavior varies and may include privacy or support implications.
and
These control relaxed vs strict alignment for DKIM and SPF. Tightening them too early can break legitimate mail that still uses looser alignment assumptions.
Common DMARC policy mistakes
Publishing before sender mapping is complete
This is the fastest way to block legitimate application mail, vendor notifications, or overlooked subdomain sends.
Treating SPF pass as enough
SPF must align with DMARC policy, and forwarding can complicate SPF-only assumptions. DKIM alignment often ends up carrying more of the enforcement load.
Ignoring subdomains
Policy behavior can differ across domains and subdomains. Make sure the record and sender architecture match the way your organization actually sends mail.
Changing policy without a rollback plan
Treat DMARC policy changes like production changes. They need owners, measurement, and rollback instructions.
How to validate DMARC policy safely
Use these in sequence:
If you also need to validate sender alignment, pair DMARC work with:
Change-management checklist
Before increasing enforcement:
- confirm every known sender is documented
- validate live SPF and DKIM behavior
- pick a quiet change window
- define success and rollback conditions
- assign someone to review reports after the change
This is the operational difference between a safe policy rollout and a domain-wide support incident.
Rollback rules worth deciding in advance
Before raising enforcement, decide what will trigger a rollback:
- legitimate customer mail starts failing
- an expected vendor flow disappears from reports
- support volume spikes after the change
- subdomain sends were not mapped correctly
Without rollback conditions, teams tend to argue about symptoms after the policy is already live.
FAQ
What is DMARC policy in simple terms?
It is the rule in your DMARC record that tells receiving servers how to handle mail that fails DMARC evaluation.
Should I start with ?
Usually no. Start with , map senders, fix alignment, then move through before considering .
What does do?
It tells receiving systems to treat failing mail as suspicious, often routing it toward spam or junk rather than trusting it as normal inbox mail.
Does DMARC policy affect deliverability?
Yes. Bad DMARC policy decisions can hurt legitimate delivery just as easily as weak policy can let spoofing through.
Final take
DMARC policy is a security control and an operational control. The safest path is staged enforcement, verified alignment, and ongoing monitoring after each policy change.


