Create secure DMARC policies in seconds
Generate properly configured DMARC records for your domain. Choose your policy level, set reporting addresses, and get a ready-to-use DNS record.
Choose how receiving servers should handle unauthenticated emails
Email address to receive daily DMARC aggregate reports
Create a dedicated mailbox as you may receive many reports daily
Email address to receive forensic failure reports
Detailed reports about individual authentication failures
Automatically generates valid DMARC record syntax without manual errors
Includes recommended settings and proper tag ordering
Get your DMARC record immediately, ready for DNS publication
Provides implementation guidance and next steps
v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; ruf=mailto:dmarc-forensic@example.com; fo=1; adkim=r; aspf=r; pct=100; rf=afrf; ri=86400; sp=quarantine
Specifies the DMARC version. Must always be 'DMARC1'
Example:
v=DMARC1DMARC1The only valid version identifier for DMARC
Defines the policy for handling emails that fail DMARC authentication
Example:
p=quarantinenoneNo action taken, monitoring only
quarantineSend failing emails to spam/junk folder
rejectReject failing emails completely
Email address to receive daily aggregate reports
Example:
rua=mailto:dmarc-reports@example.commailto:email@domain.comStandard email address format
https://example.com/dmarcHTTP/HTTPS endpoint (less common)
Email address to receive detailed failure reports
Example:
ruf=mailto:dmarc-forensic@example.commailto:email@domain.comEmail address for forensic reports
Specifies when to generate failure reports
Example:
fo=10Generate reports if both SPF and DKIM fail (default)
1Generate reports if either SPF or DKIM fails
dGenerate reports if DKIM signature fails
sGenerate reports if SPF evaluation fails
Specifies alignment mode for DKIM authentication
Example:
adkim=rrRelaxed alignment - allows subdomains (default)
sStrict alignment - exact domain match required
Specifies alignment mode for SPF authentication
Example:
aspf=rrRelaxed alignment - allows subdomains (default)
sStrict alignment - exact domain match required
Percentage of failing messages to apply policy to
Example:
pct=251-100Percentage value (100 is default, meaning all messages)
Format for failure reports
Example:
rf=afrfafrfAuthentication Failure Reporting Format (default)
iodefIncident Object Description Exchange Format
Interval between aggregate reports in seconds
Example:
ri=8640086400Daily reports (default - 24 hours)
604800Weekly reports (7 days)
3600Hourly reports (not recommended)
Policy for subdomains (if different from main policy)
Example:
sp=rejectnoneNo action for subdomain emails
quarantineQuarantine subdomain emails that fail
rejectReject subdomain emails that fail
Use the DMARC record string generated by our tool
Log into your domain registrar or DNS hosting service
Add a new TXT record with hostname: _dmarc.yourdomain.com
Use our DMARC checker to verify the record is published correctly
Ensure SPF and DKIM are properly configured before DMARC
Policy:
Prerequisites setupSPF and DKIM passing for all legitimate mail
Monitor all email sources without enforcement
Policy:
v=DMARC1; p=none; rua=mailto:reports@domain.com95%+ of legitimate mail passes authentication
Start with low percentage enforcement
Policy:
v=DMARC1; p=quarantine; pct=10; rua=mailto:reports@domain.comNo legitimate mail in quarantine
Maximum protection with full enforcement
Policy:
v=DMARC1; p=reject; rua=mailto:reports@domain.comConsistent protection against spoofing
Jumping directly to quarantine or reject without understanding email sources
Consequence:
Legitimate emails may be blocked or sent to spam
Solution:
Always start with p=none and analyze reports for at least one week
Implementing DMARC without proper authentication mechanisms
Consequence:
All emails will fail DMARC authentication
Solution:
Configure SPF and DKIM at least 48 hours before DMARC
Setting adkim=s or aspf=s without understanding subdomain usage
Consequence:
Legitimate emails from subdomains may fail authentication
Solution:
Start with relaxed alignment and move to strict gradually
Not analyzing aggregate and forensic reports regularly
Consequence:
Missing authentication issues and potential threats
Solution:
Review reports daily during rollout, weekly during maintenance
Not including marketing platforms, CRMs, or other email services
Consequence:
Legitimate marketing and transactional emails may be blocked
Solution:
Inventory all email sources and ensure proper authentication
Begin with p=none and low percentages to avoid disrupting email delivery
Create separate mailboxes for DMARC reports to manage high volume
Review DMARC reports frequently, especially during initial rollout
Keep records of all authorized email sources and configuration changes
Get started with our email validation API and experience the power of AI-powered email validation.