DMARC Policy: Essential Guide

Dmarc feature image

DMARC that stands for (Domain-based Message Authentication, Reporting, and Conformance) is a type of email protocol that uses SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Emails). It controls the situation when email fails authentication tests. It is published at the side of domain.

Download FREE Step By Step DMARC Implementation Guide

What is DMARC ?

DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication protocol. It builds on the widely deployed SPF and DKIM protocols, adding a reporting function that allows senders and receivers to improve and monitor the protection of the domain from fraudulent email.

DMARC makes it easier for email senders and receivers to determine whether or not a given message is the real email from the sender, and what to do if it isn’t. DMARC makes it easier to identify spam and phishing messages and keep them out of users, customers, and email inboxes. DMARC allows email senders and receivers to cooperate in sharing information about the email they send to each other.

If you want to remove the threat of direct domain spoofing, prevent spear phishing attacks then you must implement DMARC.

Why should you implement DMARC?

Here are three compelling reasons:

  • Reputation: Publishing a record protects your brand by preventing unauthenticated parties from sending mail from your domain. In some cases, simply publishing a record can result in a positive reputation bump.
  • Visibility: DMARC reports increase visibility into your email program by letting you know who is sending emails from your domain.
  • Security: DMARC helps the email community establish a consistent policy for dealing with messages that fail to authenticate, making the email ecosystem as a whole more secure and trustworthy.

How it works ?


As mentioned earlier DMARC uses SPF and DKIM, these all components work together to authenticate the message and decide what to do with it. If any email fails authentication then the below process happens:

  1. The DNS owner publishes a DMARC for himself
  2. When the email is sent by the sender the recipient mail server checks for the DMARC record
  3. The recipient mail server performs the SPF and DKIM authentication in order to test if the sender is really the domain.
  4. After performing the above mentioned tests the receiver mail server sends the DMARC Aggregate Reports on outcome of the message received to the email address specified in the domain’s DMARC records.

DMARC protocol is essential as email is the primary source of communication in any business. It fights the malicious email practices the can put your business in risk. DMARC is used to safeguard the email phishing and scam practices.

SPF & DKIM – the prerequisites 


SPF is a DNS text entry which displays a collection of servers that should be  permitted to send mail for a specific domain. It enforce the principle that the list of people is authoritative for the domain, since the owners/administrators are the only people allowed to add / change the key domain. Hosts are permitted to use a particular domain name is published in the Domain Name System (DNS) records for that domain, as a TXT record. Mail receivers can use that records to check the authorisation. SPF’s advantage is the receiver can then use the sender’s domain to determine email acceptance or rejection.


DKIM is a signature-based Email Authentication technique. It is the result of merging the DomainKeys and Identified Internet Mail specifications.It allows a domain owner to tag and email message with a digital signature. Verification of the email is done using the signer’s public key, which is published in the DNS. A valid signature ensures that at some part of the email have not been modified since the signature was attached.

DMARC has three settings: monitor; quarantine; and reject, and organisations decide how they want to hande unauthenticated emails.To know more about how DMARC works, check out our blog on DMARC.

How it protects organization from Phishing?

  1. DMARC confirms if the received email is real or not. Before DMARC it was unstable as some of the legitimate mails are tagged in spams.
  2. DMARC creates consistency for dealing with messages that fail to authenticate.This helps the mail ecosystem as a whole become more secure and more trustworthy.
  3. Publishing a DMARC record protects brands reputation by stopping unauthorised hosts from sending mail on behalf of your domain.
  4. DMARC reports give you visibility of who is sending mail from your domain.
  5. It increases control and security.

Implementing DMARC on your organization’s mail servers domains is the first step to protecting your enterprise from phishing attacks. To ease up the implementation we offer DMARC+ solution, which provides easy implementation dashboard which can your journey easy.

DMARC Deployment Steps

If you want to deploy DMARC, it’s recommended to ramp up slowly by employing policies in a specific order. Here’s a conservative DMARC deployment cycle:

  1. Monitor all
  2. Quarantine 1%
  3. Quarantine 5%
  4. Quarantine 10%
  5. Quarantine 25%
  6. Quarantine 50%
  7. Quarantine all
  8. Reject 1%
  9. Reject 5%
  10. Reject 10%
  11. Reject 25%
  12. Reject 50%
  13. Reject all

Start by monitoring your traffic and looking for anomalies in the reports. Then, move on to changing the TXT record policy setting from “none” to “quarantine.” Review the results, both in your spam catch and in the daily DMARC reports. Once you’re sure all of your messages are signed, change the policy setting to “reject” to make full use of DMARC.

To stage and sample your DMARC deployment, use the optional pct tag. Since 100% is the default, passing “pct=20” in your DMARC TXT record results in one-fifth of all messages affected by the policy receiving the disposition instead of all of them. This setting is especially useful once you elect to quarantine and reject mail. Start with a lower percentage, and increase it every few days.

As always, review your daily reports and attempt to remove the percentages as quickly as possible to complete the deployment. Remember, the ultimate goal is to make full use of DMARC by rejecting all unauthenticated messages. By following these deployment steps and reviewing reports, you can make your email ecosystem more secure and trustworthy.

How can I tell if DMARC is making a difference?

A day or two after a domain owner publishes the simplest monitoring-mode DMARC record in DNS, they will begin to receive reports from DMARC receivers with statistics about email sent to them using the domain owner’s domain. In other words, if you own or operate and publish a DMARC record requesting reports, you will get statistics on all messages that claim to come from your domain from all DMARC receivers. So, you will suddenly be able to see how many fraudulent messages are using your domain, where they’re coming from, and whether or not they would be stopped by a DMARC “quarantine” or “reject” policy. The report from each receiver is an XML file that includes the following fields:

  • Every IP address using your domain to send email
  • A count of messages from each of those IP addresses
  • What was done with these messages per the DMARC policy shown
  • SPF results for these messages
  • DKIM results for these messages

Usually, DMARC Solution’s client portal provide reports which provide a great deal of insight into the health of your message streams.

Limitations of DMARC

DMARC is a great solution for preventing direct domain spoofing. When an email is sent by an unauthorized sender (whether it is sent by a malicious user, or even an unauthorized user of a department of the company that owns/operates the domain), DMARC can be used to detect the unauthorized activity and (if so configured) request that those messages be blocked or discarded when they are received.

If the owners/operators of  use DMARC to protect that domain, it would have no effect on, unless .NET is also DMARCISED. Impersonating a given domain is a common method used for phishing and other malicious activities, there are other attack vectors that DMARC does not address.

DMARC does not address cousin domain attacks (i.e. sending from a domain that looks like the target being abused – e.g. vs ), or display name abuse where the  “From” field is altered to look as if it comes from the target being abused.

Download Implementation of DMARC

We have curated step by step guide to implementation of DMARC.


In conclusion, DMARC is an effective way to protect your email domain from malicious practices such as domain spoofing and phishing attacks. With the right deployment plan, you can gradually ramp up your DMARC usage and make your email ecosystem more secure and trustworthy. For expert consultancy on designing a deployment plan for your email infrastructure, feel free to contact us.

To learn more about DMARC, click here to read similar articles curated by us.

Deeksha is a seasoned cybersecurity expert, dedicated to defending the digital domain from cyber threats. With a strong grasp of technology's dual-edged nature, she excels in threat detection, risk mitigation, and ensuring regulatory compliance. Her proactive approach and unwavering commitment make her a reliable guardian in the ever-evolving digital landscape.

4 thoughts on “DMARC Policy: Essential Guide

Comments are closed.

  • Products
  • Services

Get Secured Today!

Click that button and let’s chat! We promise to turn the murky, often scary world of cybersecurity into a walk in the digital park for your organization. Together, let’s make cybersecurity a piece of cake!