Home » Email Deliverability » DMARC Setup

What Is DMARC and Why You Need It in 2026

DMARC (Domain-based Message Authentication, Reporting and Conformance) is a DNS record that tells receiving mail servers what to do when an email claiming to be from your domain fails SPF and DKIM authentication. It also sends you reports about who is sending email using your domain. As of 2024, Gmail and Yahoo require DMARC for bulk senders, and in 2026 enforcement is stricter than ever, making DMARC essential for any business that sends marketing email.

Why DMARC Matters Now More Than Ever

Before 2024, DMARC was recommended but optional for most senders. That changed when Google and Yahoo announced that bulk senders (anyone sending more than 5,000 emails per day to their users) must have a DMARC policy published. Microsoft followed with similar requirements for Outlook. In 2026, these requirements have only gotten more strict, with ISPs giving increasingly strong preference to domains with DMARC enforcement policies.

Without DMARC, your domain is vulnerable to spoofing (anyone can send email pretending to be from yourdomain.com), and ISPs treat your legitimate emails with less trust. DMARC solves both problems by tying SPF and DKIM together with a clear policy and giving you visibility into who is using your domain to send email.

How DMARC Works

DMARC builds on SPF and DKIM. When a receiving server gets an email, it runs both SPF and DKIM checks. DMARC then adds two additional requirements:

Alignment

DMARC requires that the domain used in either the SPF check or the DKIM check matches (aligns with) the domain in the visible From address. This prevents an attacker from passing SPF with their own domain while spoofing your domain in the From header. At least one of SPF or DKIM must both pass and align for DMARC to pass.

Policy

Your DMARC record includes a policy tag (p=) that tells receiving servers what to do when DMARC fails:

Reporting

DMARC sends daily XML reports to an email address you specify, showing every IP that sent email using your domain, whether it passed or failed SPF/DKIM/DMARC, and how many messages each IP sent. These reports are invaluable for discovering unauthorized use of your domain and finding legitimate sending sources you forgot to authenticate.

How to Set Up DMARC

Step 1: Verify SPF and DKIM are working first.
DMARC depends on SPF and DKIM being properly configured. If you have not set those up yet, do that before adding DMARC. See the SPF guide and DKIM guide. Send test emails and confirm both show "pass" in the Authentication-Results headers.
Step 2: Create your DMARC DNS record.
Add a TXT record to your DNS at the subdomain _dmarc.yourdomain.com. Start with a monitoring-only policy: v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com. The rua tag specifies where aggregate reports are sent. Use an email address you actually monitor.
Step 3: Monitor reports for 2-4 weeks.
With p=none, no email is affected but you start receiving reports. Review these reports (or use a free DMARC report analyzer) to identify all sources sending email from your domain. Confirm each legitimate source passes SPF or DKIM with alignment. If you find legitimate services failing, fix their authentication before moving to a stricter policy.
Step 4: Move to quarantine.
Once you are confident all legitimate email passes DMARC, update your policy to p=quarantine. You can use the pct= tag to roll this out gradually: pct=10 applies the quarantine policy to only 10% of failing messages. Increase this over time to pct=100.
Step 5: Move to reject (optional but recommended).
For maximum protection against domain spoofing, change to p=reject. This tells ISPs to completely reject any email that fails DMARC, effectively preventing anyone from impersonating your domain. Only do this when you are certain all your legitimate email is authenticated.

DMARC Record Syntax

A complete DMARC record looks like:

v=DMARC1; p=quarantine; rua=mailto:dmarc@yourdomain.com; ruf=mailto:dmarc-forensic@yourdomain.com; pct=100; adkim=r; aspf=r

Common DMARC Mistakes

Jumping Straight to Reject

If you go directly to p=reject without monitoring first, you may block legitimate email from services you forgot to authenticate (CRM, help desk, transactional email, etc.). Always start with p=none and review reports before tightening the policy.

Not Reading the Reports

DMARC reports are XML files that are difficult to read raw. Use a free analyzer tool (like MXToolbox, Postmark DMARC, or DMARC Analyzer) to parse them into readable dashboards. The reports tell you exactly what is passing and failing, so they are worth reviewing regularly.

Subdomain Policy Gaps

DMARC policies on your root domain do not automatically cover subdomains unless you add sp= (subdomain policy). If you send from marketing.yourdomain.com, you need either a DMARC record on that subdomain or an sp= tag on the root domain record.

2026 requirement: Gmail, Yahoo, and Microsoft all require at minimum a DMARC record with p=none for bulk senders. Many ISPs now give stronger inbox placement preference to domains with p=quarantine or p=reject. Having no DMARC record at all puts you at a disadvantage for deliverability even if your SPF and DKIM are perfect.

Protect your domain and improve deliverability. Set up your email sending with proper authentication and monitoring built in.

Get Started Free