Create secure DMARC policies in seconds
Generate properly configured DMARC records for your domain. Choose your policy level, set reporting addresses, and get a ready-to-use DNS record.
Choose how receiving servers should handle unauthenticated emails
Email address to receive daily DMARC aggregate reports
Create a dedicated mailbox as you may receive many reports daily
Email address to receive forensic failure reports
Detailed reports about individual authentication failures
Automatically generates valid DMARC record syntax without manual errors
Includes recommended settings and proper tag ordering
Get your DMARC record immediately, ready for DNS publication
Provides implementation guidance and next steps
v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; ruf=mailto:dmarc-forensic@example.com; fo=1; adkim=r; aspf=r; pct=100; rf=afrf; ri=86400; sp=quarantine
Specifies the DMARC version. Must always be 'DMARC1'
Example:
v=DMARC1
DMARC1
The only valid version identifier for DMARC
Defines the policy for handling emails that fail DMARC authentication
Example:
p=quarantine
none
No action taken, monitoring only
quarantine
Send failing emails to spam/junk folder
reject
Reject failing emails completely
Email address to receive daily aggregate reports
Example:
rua=mailto:dmarc-reports@example.com
mailto:email@domain.com
Standard email address format
https://example.com/dmarc
HTTP/HTTPS endpoint (less common)
Email address to receive detailed failure reports
Example:
ruf=mailto:dmarc-forensic@example.com
mailto:email@domain.com
Email address for forensic reports
Specifies when to generate failure reports
Example:
fo=1
0
Generate reports if both SPF and DKIM fail (default)
1
Generate reports if either SPF or DKIM fails
d
Generate reports if DKIM signature fails
s
Generate reports if SPF evaluation fails
Specifies alignment mode for DKIM authentication
Example:
adkim=r
r
Relaxed alignment - allows subdomains (default)
s
Strict alignment - exact domain match required
Specifies alignment mode for SPF authentication
Example:
aspf=r
r
Relaxed alignment - allows subdomains (default)
s
Strict alignment - exact domain match required
Percentage of failing messages to apply policy to
Example:
pct=25
1-100
Percentage value (100 is default, meaning all messages)
Format for failure reports
Example:
rf=afrf
afrf
Authentication Failure Reporting Format (default)
iodef
Incident Object Description Exchange Format
Interval between aggregate reports in seconds
Example:
ri=86400
86400
Daily reports (default - 24 hours)
604800
Weekly reports (7 days)
3600
Hourly reports (not recommended)
Policy for subdomains (if different from main policy)
Example:
sp=reject
none
No action for subdomain emails
quarantine
Quarantine subdomain emails that fail
reject
Reject subdomain emails that fail
Use the DMARC record string generated by our tool
Log into your domain registrar or DNS hosting service
Add a new TXT record with hostname: _dmarc.yourdomain.com
Use our DMARC checker to verify the record is published correctly
Ensure SPF and DKIM are properly configured before DMARC
Policy:
Prerequisites setup
SPF and DKIM passing for all legitimate mail
Monitor all email sources without enforcement
Policy:
v=DMARC1; p=none; rua=mailto:reports@domain.com
95%+ of legitimate mail passes authentication
Start with low percentage enforcement
Policy:
v=DMARC1; p=quarantine; pct=10; rua=mailto:reports@domain.com
No legitimate mail in quarantine
Maximum protection with full enforcement
Policy:
v=DMARC1; p=reject; rua=mailto:reports@domain.com
Consistent protection against spoofing
Jumping directly to quarantine or reject without understanding email sources
Consequence:
Legitimate emails may be blocked or sent to spam
Solution:
Always start with p=none and analyze reports for at least one week
Implementing DMARC without proper authentication mechanisms
Consequence:
All emails will fail DMARC authentication
Solution:
Configure SPF and DKIM at least 48 hours before DMARC
Setting adkim=s or aspf=s without understanding subdomain usage
Consequence:
Legitimate emails from subdomains may fail authentication
Solution:
Start with relaxed alignment and move to strict gradually
Not analyzing aggregate and forensic reports regularly
Consequence:
Missing authentication issues and potential threats
Solution:
Review reports daily during rollout, weekly during maintenance
Not including marketing platforms, CRMs, or other email services
Consequence:
Legitimate marketing and transactional emails may be blocked
Solution:
Inventory all email sources and ensure proper authentication
Begin with p=none and low percentages to avoid disrupting email delivery
Create separate mailboxes for DMARC reports to manage high volume
Review DMARC reports frequently, especially during initial rollout
Keep records of all authorized email sources and configuration changes
Get started with our email validation API and experience the power of AI-powered email validation.