means a message failed DMARC evaluation and the domain's policy asked the receiver to reject it rather than accept or quarantine it. If you searched for , , or , the real concern is usually one of two things:
- "Are we ready to publish reject?"
- "Why did legitimate mail just start getting blocked?"
The short answer is that is the strongest DMARC posture, but it is only safe after sender inventory, SPF and DKIM alignment, and rollout monitoring are already in place.
Quick answer
Use when:
- legitimate senders are already aligned
- monitoring has been stable under
- stricter enforcement has been observed safely under
or limited rollout - the team can identify and roll back broken senders quickly
Do not use as a guess-based security shortcut. It is an enforcement decision with delivery consequences.
What actually tells receivers to do
DMARC policy is a receiver instruction. When a message fails DMARC and the record says , the domain owner is asking the receiver not to accept that mail as legitimate.
In practice, this usually means:
- the message is blocked at SMTP time
- the message is refused before it reaches the inbox
- the sender may receive a bounce or reject response
It does not mean "send it to spam." That is closer to behavior. Reject is intended to stop the message from being treated as valid mail for that domain.
DMARC reject vs DMARC fail vs quarantine
These states are related, but they describe different things.
| Term | What it means | Operational question |
|---|---|---|
| DMARC fail | the message did not pass aligned SPF or DKIM | why did alignment break? |
| DMARC quarantine | the domain asks receivers to treat failing mail as suspicious | are we ready for stronger enforcement? |
| DMARC reject | the domain asks receivers to block failing mail | are all legitimate senders truly ready? |
This is why the right sequence is usually:
- understand fail causes
- fix alignment
- stage policy changes
- move to reject only when confidence is high
If you still need to diagnose the failure itself, start with DMARC fail.
Why legitimate mail gets rejected under DMARC
Most legitimate reject incidents are not caused by DMARC itself. They are caused by rollout gaps that enforcement exposes.
A real sender was never inventoried
Common examples:
- a billing platform
- a support desk
- a CRM or lifecycle system
- an old app sending direct SMTP
- a security-alert service using your From domain
If that sender never aligned SPF or DKIM, will surface it immediately.
DKIM aligned yesterday, but not today
Selector rotation, provider changes, or DNS mistakes can make previously healthy flows fail under reject policy.
SPF passes, but alignment is wrong
Teams often mistake SPF pass for DMARC readiness. Under reject policy, a non-aligned pass does not save the message.
Enforcement was raised too quickly
Publishing before reports were reviewed or before edge senders were tested creates preventable outage risk.
Subdomain behavior was never planned
Organizations often think about the root domain but forget the subdomains actually used for notifications, support, or regional mail streams.
When is the right policy
Reject is appropriate when the organization has done the hard operational work first.
That usually means:
- every known sender is documented
- aligned DKIM exists for critical flows
- SPF is understood and stable
- aggregate reporting is being reviewed
- support, product, and platform teams know who owns sender changes
- rollback rules are already defined
Reject is strongest when it is boring. If it still feels dramatic, the domain probably is not ready.
Safe DMARC reject rollout model
Use this sequence:
- Publish a valid record with
. - Collect reports and inventory all legitimate senders.
- Fix alignment gaps one sender at a time.
- Move to
or a limited rollout only after live traffic looks healthy. - Test critical paths such as signup, reset, billing, support, and alerts.
- Raise to
during a quiet change window. - Watch reports, headers, and support signals immediately after the cutover.
This is slower than "just set reject," but it is much faster than recovering from an avoidable deliverability incident.
What to do if legitimate mail is already being rejected
Treat it like a production incident, not a theoretical policy discussion.
1. Confirm which flows are affected
Find out whether the issue is limited to:
- one sender platform
- one mailbox provider
- one subdomain
- one workflow such as billing or password resets
2. Pull real headers or failure evidence
Look at:
- visible From domain
Use Email header analyzer and DMARC checker together.
3. Decide whether rollback is warranted
If customer-critical flows are failing and the fix is not immediate, reduce policy pressure first. The right answer may be temporarily moving back to or while alignment is repaired.
4. Fix the sender, not just the policy
Common fixes include:
- aligning the DKIM signing domain
- aligning the return-path strategy
- publishing the missing selector
- changing the From domain used by the sender
- updating a vendor configuration that never matched policy
5. Re-test before restoring reject
Use Email deliverability test to verify that critical flows are healthy before returning to a stricter posture.
How MailSlurp helps with DMARC reject rollout
MailSlurp helps teams reduce the gap between "policy looks correct" and "real mail flows still work."
Use MailSlurp to:
- validate the record and tags with DMARC checker
- inspect live headers with Email header analyzer
- monitor sender posture with DMARC, SPF, DKIM, and BIMI monitoring
- run release-grade checks with Email deliverability test
That matters because reject rollout is usually not owned by one team. Security, platform, support, and product operations often all feel the outcome.
If the receiver could not even parse the policy record, go to Permanent error evaluating DMARC policy.
Related reading
FAQ
What does DMARC reject mean in simple terms?
It means the domain asked receiving systems to reject messages that fail DMARC instead of trusting or quarantining them.
Does DMARC reject always happen at SMTP time?
Often, but behavior depends on the receiver. The important point is that the message is being treated as unauthorized for that domain.
Should I move directly from to ?
Usually no. Most domains are safer moving through monitoring, sender cleanup, and an intermediate enforcement stage first.
Can DMARC reject block legitimate mail?
Yes. That is why reject must be rolled out only after legitimate senders are aligned and tested.
Final take
is powerful because it lets a domain draw a hard line against unauthorized mail. It is dangerous when teams treat it like a simple DNS setting instead of an enforcement change. The safest rollouts come from verified alignment, controlled change windows, and fast evidence when something drifts.