Free DMARC Record Generator

Create secure DMARC policies in seconds

Generate properly configured DMARC records for your domain. Choose your policy level, set reporting addresses, and get a ready-to-use DNS record.

DMARC Policy

Choose how receiving servers should handle unauthenticated emails

Email address to receive daily DMARC aggregate reports

Create a dedicated mailbox as you may receive many reports daily

Email address to receive forensic failure reports

Detailed reports about individual authentication failures

Why Use Our DMARC Generator?

Creating DMARC records manually can be error-prone. Our generator ensures proper syntax and best practices.

Error-Free Syntax

Automatically generates valid DMARC record syntax without manual errors

Best Practice Defaults

Includes recommended settings and proper tag ordering

Instant Generation

Get your DMARC record immediately, ready for DNS publication

Guidance Included

Provides implementation guidance and next steps

Understanding DMARC Record Values

Learn what each tag and value means in a DMARC record and how they work together.

Example DMARC Record:

v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; ruf=mailto:dmarc-forensic@example.com; fo=1; adkim=r; aspf=r; pct=100; rf=afrf; ri=86400; sp=quarantine
v

Version

Required

Specifies the DMARC version. Must always be 'DMARC1'

Example:

v=DMARC1

Possible Values:

DMARC1

The only valid version identifier for DMARC

p

Policy

Required

Defines the policy for handling emails that fail DMARC authentication

Example:

p=quarantine

Possible Values:

none

No action taken, monitoring only

quarantine

Send failing emails to spam/junk folder

reject

Reject failing emails completely

rua

Aggregate Reports URI

Optional

Email address to receive daily aggregate reports

Example:

rua=mailto:dmarc-reports@example.com

Possible Values:

mailto:email@domain.com

Standard email address format

https://example.com/dmarc

HTTP/HTTPS endpoint (less common)

ruf

Failure Reports URI

Optional

Email address to receive detailed failure reports

Example:

ruf=mailto:dmarc-forensic@example.com

Possible Values:

mailto:email@domain.com

Email address for forensic reports

fo

Failure Options

Optional

Specifies when to generate failure reports

Example:

fo=1

Possible Values:

0

Generate reports if both SPF and DKIM fail (default)

1

Generate reports if either SPF or DKIM fails

d

Generate reports if DKIM signature fails

s

Generate reports if SPF evaluation fails

adkim

DKIM Alignment

Optional

Specifies alignment mode for DKIM authentication

Example:

adkim=r

Possible Values:

r

Relaxed alignment - allows subdomains (default)

s

Strict alignment - exact domain match required

aspf

SPF Alignment

Optional

Specifies alignment mode for SPF authentication

Example:

aspf=r

Possible Values:

r

Relaxed alignment - allows subdomains (default)

s

Strict alignment - exact domain match required

pct

Percentage

Optional

Percentage of failing messages to apply policy to

Example:

pct=25

Possible Values:

1-100

Percentage value (100 is default, meaning all messages)

rf

Report Format

Optional

Format for failure reports

Example:

rf=afrf

Possible Values:

afrf

Authentication Failure Reporting Format (default)

iodef

Incident Object Description Exchange Format

ri

Report Interval

Optional

Interval between aggregate reports in seconds

Example:

ri=86400

Possible Values:

86400

Daily reports (default - 24 hours)

604800

Weekly reports (7 days)

3600

Hourly reports (not recommended)

sp

Subdomain Policy

Optional

Policy for subdomains (if different from main policy)

Example:

sp=reject

Possible Values:

none

No action for subdomain emails

quarantine

Quarantine subdomain emails that fail

reject

Reject subdomain emails that fail

How to Implement Your DMARC Record

Step-by-step instructions to publish your generated DMARC record.

Copy the generated record

Use the DMARC record string generated by our tool

Access your DNS provider

Log into your domain registrar or DNS hosting service

Create TXT record

Add a new TXT record with hostname: _dmarc.yourdomain.com

Verify publication

Use our DMARC checker to verify the record is published correctly

DMARC Troubleshooting Guide

Common issues and solutions when implementing DMARC policies.

Messages failing DMARC authentication

Symptoms:

  • Legitimate emails being rejected or quarantined
  • Bounce messages mentioning DMARC policy violations
  • Recipients reporting missing emails

Causes:

  • SPF or DKIM not properly configured
  • Strict alignment causing failures
  • Third-party services not authenticated

Solutions:

  • Verify SPF includes all sending IP addresses
  • Ensure DKIM signatures are valid and aligned
  • Check DMARC reports for failure patterns
  • Consider relaxed alignment initially

DKIM authentication failures

Symptoms:

  • DKIM verification failing in email headers
  • Messages modified during transit
  • Invalid DKIM signatures

Causes:

  • DKIM key not published correctly
  • Message modification after signing
  • Incorrect DKIM configuration

Solutions:

  • Verify DKIM key publication in DNS
  • Check for message modification in transit
  • Validate DKIM selector and domain
  • Test with Google Admin Toolbox

SPF authentication failures

Symptoms:

  • SPF checks failing for legitimate senders
  • Messages from authorized servers being rejected
  • Incomplete SPF coverage

Causes:

  • Missing IP addresses in SPF record
  • Incorrect SPF syntax
  • Third-party services not included

Solutions:

  • Add all authorized sending IPs to SPF
  • Include third-party service mechanisms
  • Verify SPF record syntax
  • Use SPF record checker tools

Alignment issues

Symptoms:

  • Authentication passes but DMARC fails
  • Domain mismatch errors
  • Subdomain alignment problems

Causes:

  • From domain doesn't match SPF/DKIM domains
  • Strict alignment with subdomain senders
  • Third-party service domain misalignment

Solutions:

  • Use relaxed alignment (adkim=r, aspf=r)
  • Ensure From domain matches authentication domains
  • Configure third-party services properly
  • Review alignment requirements

Safe DMARC Rollout Strategy

Implement DMARC gradually to avoid disrupting legitimate email delivery.
1:

Phase 1: Preparation

1-2 weeks

Ensure SPF and DKIM are properly configured before DMARC

Policy:

Prerequisites setup

Actions:

  • Configure SPF record with all sending IPs
  • Set up DKIM signing for all email sources
  • Wait 48 hours for DNS propagation
  • Test SPF and DKIM authentication
  • Set up dedicated reporting mailboxes

Success Criteria:

SPF and DKIM passing for all legitimate mail

2:

Phase 2: Monitoring

1-2 weeks

Monitor all email sources without enforcement

Policy:

v=DMARC1; p=none; rua=mailto:reports@domain.com

Actions:

  • Publish DMARC record with p=none
  • Collect and analyze daily aggregate reports
  • Identify all legitimate sending sources
  • Fix any SPF or DKIM issues discovered
  • Document all authorized email sources

Success Criteria:

95%+ of legitimate mail passes authentication

3:

Phase 3: Gradual Enforcement

2-4 weeks

Start with low percentage enforcement

Policy:

v=DMARC1; p=quarantine; pct=10; rua=mailto:reports@domain.com

Actions:

  • Begin with 10% quarantine policy
  • Monitor spam folders for false positives
  • Gradually increase percentage (10% → 25% → 50%)
  • Address any delivery issues immediately
  • Continue analyzing reports daily

Success Criteria:

No legitimate mail in quarantine

4:

Phase 4: Full Protection

Ongoing

Maximum protection with full enforcement

Policy:

v=DMARC1; p=reject; rua=mailto:reports@domain.com

Actions:

  • Move to 100% quarantine, then reject
  • Monitor for spoofing attempts
  • Regular policy reviews and updates
  • Handle legitimate sender issues promptly
  • Maintain SPF and DKIM records

Success Criteria:

Consistent protection against spoofing

Common DMARC Implementation Mistakes

Avoid these frequent pitfalls when implementing DMARC policies.

Skipping the monitoring phase

Jumping directly to quarantine or reject without understanding email sources

Consequence:

Legitimate emails may be blocked or sent to spam

Solution:

Always start with p=none and analyze reports for at least one week

Not setting up SPF and DKIM first

Implementing DMARC without proper authentication mechanisms

Consequence:

All emails will fail DMARC authentication

Solution:

Configure SPF and DKIM at least 48 hours before DMARC

Using strict alignment too early

Setting adkim=s or aspf=s without understanding subdomain usage

Consequence:

Legitimate emails from subdomains may fail authentication

Solution:

Start with relaxed alignment and move to strict gradually

Ignoring DMARC reports

Not analyzing aggregate and forensic reports regularly

Consequence:

Missing authentication issues and potential threats

Solution:

Review reports daily during rollout, weekly during maintenance

Forgetting third-party services

Not including marketing platforms, CRMs, or other email services

Consequence:

Legitimate marketing and transactional emails may be blocked

Solution:

Inventory all email sources and ensure proper authentication

DMARC Generator Best Practices

Follow these recommendations for successful DMARC implementation.

Start Conservative

Begin with p=none and low percentages to avoid disrupting email delivery

Use Dedicated Mailboxes

Create separate mailboxes for DMARC reports to manage high volume

Monitor Regularly

Review DMARC reports frequently, especially during initial rollout

Document Everything

Keep records of all authorized email sources and configuration changes

DMARC Generator FAQ

Common questions about generating and implementing DMARC records.

Try Email Validation API for free!

Get started with our email validation API and experience the power of AI-powered email validation.

No credit card required
100 credits free