Why Google Workspace Users Need DMARC
Google Workspace (formerly G Suite) routes your business email through Google's servers under your
custom domain. While Google handles delivery reliably, the platform does not automatically prevent
others from spoofing your domain — sending email that appears to come from anyone@yourdomain.com
without your authorization.
DMARC closes this gap. It builds on SPF and DKIM to give receiving mail servers a clear policy: if email claiming to come from your domain does not pass authentication checks, treat it as suspicious and quarantine or reject it. Without DMARC, phishing attacks impersonating your brand can reach your customers, partners, or employees with no technical barrier stopping them.
The urgency has increased following Google's own sender requirements. Google now mandates that senders sending 5,000 or more messages per day to Gmail accounts must have a valid DMARC record in place. Organizations that do not comply risk their email being rejected or marked as spam by Gmail — which, with over 1.8 billion active users, represents a significant deliverability risk for any business.
There is also a compelling upside beyond protection. BIMI — the standard that displays your brand
logo next to your emails in Gmail inboxes — requires a DMARC policy of p=quarantine or
p=reject. Getting DMARC right is not just a security measure; it is the prerequisite
for one of the most visible email branding wins available today.
Step 1: Verify Your SPF Record for Google Workspace
SPF (Sender Policy Framework) specifies which mail servers are authorized to send email on behalf of your domain. For Google Workspace, the correct SPF record is:
v=spf1 include:_spf.google.com ~all
This single include mechanism covers all of Google's outgoing mail server IP ranges. The
~all qualifier is a soft fail — messages from unauthorized sources are marked as
suspicious rather than outright rejected. Many organizations start with ~all and later
tighten to -all (hard fail) once they are confident all legitimate sources are covered.
Combining Google Workspace with other sending services
If your domain also sends through other services — a marketing platform, a transactional email provider, or a helpdesk tool — those services need to be included in the same SPF record. For example, if you use Google Workspace and also send through SendGrid:
v=spf1 include:_spf.google.com include:sendgrid.net ~all
Remember: each include: counts toward the 10 DNS lookup limit. Keep your SPF record
lean, and never publish more than one SPF TXT record for the same domain name — duplicate records
cause immediate SPF failures.
After publishing or updating your SPF record, use the free SPF Checker to confirm the record resolves correctly and covers all the IP ranges Google uses for outbound mail.
Step 2: Turn On DKIM in Google Workspace Admin
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing message. The signature is generated using a private key held by Google's servers, and verified by receiving servers using a corresponding public key you publish in your DNS. This proves the message was sent by an authorized source and has not been tampered with in transit.
Google Workspace does not enable DKIM signing for custom domains automatically. You need to generate the key and enable signing from the Admin Console.
How to enable DKIM in Google Workspace
- Sign in to the Google Admin Console at admin.google.com.
- Navigate to Apps → Google Workspace → Gmail → Authenticate email.
- Select the domain you want to configure DKIM for (if you have multiple domains, repeat these steps for each).
- Click Generate new record. Google will create a 2048-bit RSA key pair and display the DNS TXT record you need to publish.
- The DNS record will look like this:
The host name isgoogle._domainkey.yourdomain.com IN TXT "v=DKIM1; k=rsa; p=MIIBIjANBgkq..."google._domainkey(or the full namegoogle._domainkey.yourdomain.comdepending on your DNS provider). - Copy the TXT record value from the Admin Console and publish it in your DNS provider.
- Wait for DNS propagation — this can take up to 48 hours, though most DNS providers propagate within an hour or two.
- Return to Apps → Google Workspace → Gmail → Authenticate email and click Start authentication to activate DKIM signing.
Once DKIM is active, use the DKIM Checker to verify that the google._domainkey
selector resolves correctly and returns a valid public key for your domain.
Step 3: Create and Publish Your DMARC Record
With SPF and DKIM configured, you are ready to add the DMARC layer. DMARC is a DNS TXT record that defines the policy for handling authentication failures and specifies where to send aggregate reports about your domain's email traffic.
Start with a monitoring-only policy. This generates reports without affecting mail delivery, giving you time to identify all your legitimate sending sources before you enforce any restrictions:
v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com
Publish this as a TXT record in your DNS with the following settings:
- Name / Host:
_dmarc(some DNS providers require the full name:_dmarc.yourdomain.com) - Type: TXT
- Value: the DMARC record string above
- TTL: 3600 (1 hour) is a common starting value
The rua tag is where aggregate reports will be sent. Replace
dmarc@yourdomain.com with the address where you want to receive these reports — ideally
an inbox connected to a DMARC reporting tool that can parse the XML automatically.
Use the free DMARC Generator to build your record with the correct syntax. Once published, verify it resolves correctly using the DMARC Checker.
Step 4: Read Your DMARC Aggregate Reports
Once your DMARC record is live with a rua address, receiving mail servers will begin
sending aggregate reports to that address. Google itself sends DMARC reports for mail received at
Gmail, typically within 24 hours. These reports are the foundation of a safe path to enforcement.
What aggregate reports contain
Each aggregate report is an XML file that covers a 24-hour period. For every IP address that sent email claiming to be from your domain, the report shows:
- The source IP address and a reverse DNS lookup
- The number of messages sent from that source
- Whether SPF passed or failed, and which domain was evaluated
- Whether DKIM passed or failed, and which selector was used
- The overall DMARC disposition applied (none, quarantine, or reject)
Common sources in Google Workspace reports
When you start receiving DMARC reports for a Google Workspace domain, you will typically see traffic from:
- Google's own mail servers — these should pass SPF and DKIM once both are configured correctly.
- Third-party marketing platforms — tools like Mailchimp, HubSpot, Klaviyo, or ActiveCampaign that send email using your domain name. Each needs its own SPF include and ideally its own DKIM key.
- Forwarding services — email forwarded through third-party services often breaks SPF alignment (because the forwarding server's IP is not in your SPF record) and may break DKIM if the message is modified.
- Transactional email providers — services like SendGrid, Postmark, or Amazon SES used for automated notifications or receipts.
The goal of the monitoring phase is to account for every source you see in reports. Any legitimate source that is failing authentication needs to be fixed before you move to enforcement.
Turn XML reports into clear dashboards
DMARC aggregate reports arrive as compressed XML files attached to emails — not designed for human reading. DMARCFlow automatically collects, parses, and visualizes every report so you can see at a glance which sources are passing or failing, track trends over time, and identify exactly what needs to be fixed before you enforce.
Start parsing your DMARC reports freeNo credit card required. Full reporting dashboard from day one.
Step 5: Reach Enforcement — and Unlock BIMI
The monitoring phase is not the destination — it is the preparation for enforcement. Once your DMARC
reports consistently show that all legitimate sending sources are passing authentication, you are
ready to move your policy to p=quarantine and eventually p=reject.
Moving from p=none to p=quarantine
Update your DMARC record to:
v=DMARC1; p=quarantine; rua=mailto:dmarc@yourdomain.com
With p=quarantine, messages that fail DMARC are delivered to the spam or junk folder
rather than the inbox. This is a meaningful protection step — spoofed emails can no longer reach
your recipients' primary inbox. At the same time, it gives you a safety net: if a legitimate sender
was missed during monitoring, their mail is filtered rather than rejected outright.
Spend several weeks at p=quarantine while continuing to monitor reports. Look for any
legitimate sources that start appearing as failures — this is your opportunity to fix them before
moving to full rejection.
Moving from p=quarantine to p=reject
Once reports show a stable, high pass rate and you have confirmed all legitimate sending sources are authenticated:
v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com
With p=reject, mail that fails DMARC is rejected by the receiving server before
delivery. This is the strongest protection available — spoofed messages claiming to come from your
domain simply never arrive at their intended targets.
p=quarantine or p=reject,
your domain qualifies for BIMI. BIMI displays your brand logo next to your emails in Gmail, Yahoo
Mail, and Apple Mail inboxes. Use the BIMI Checker to verify your
setup once you are ready to configure it.
Using pct to ramp up gradually
If you want to move cautiously, use the pct tag to apply your policy to a percentage of
failing messages. For example, to apply quarantine to 20% of failing messages initially:
v=DMARC1; p=quarantine; pct=20; rua=mailto:dmarc@yourdomain.com
Increase the percentage incrementally over several weeks while watching your reports for unexpected failures. This staged approach is especially useful for organizations with complex sending environments.
Google Workspace DMARC Checklist
Use this checklist to confirm each step of your Google Workspace DMARC setup is complete:
- SPF record published — contains
include:_spf.google.comwith no duplicate TXT records on the same domain name - Additional senders included in SPF — all marketing platforms, transactional services, and other sending tools have their SPF mechanisms added
- SPF verified — confirmed passing via the SPF Checker
- DKIM key generated in Google Admin Console — 2048-bit key created under Apps → Google Workspace → Gmail → Authenticate email
- DKIM DNS record published — TXT record at
google._domainkey.yourdomain.comlive in DNS - DKIM signing activated — Start authentication clicked in Admin Console after DNS propagation
- DKIM verified — confirmed via the DKIM Checker
- DMARC record published — TXT record at
_dmarc.yourdomain.comwithp=noneand a validruaaddress - DMARC verified — confirmed via the DMARC Checker
- Aggregate reports flowing — reports arriving at your designated address or DMARC dashboard
- All sending sources identified and authenticated — no legitimate sources appearing as DMARC failures
- Policy moved to enforcement —
p=quarantineorp=rejectonce reports confirm clean pass rates
Google Workspace makes it straightforward to enable SPF and DKIM — the main effort is in the DMARC monitoring phase, where you identify and fix every sending source before moving to enforcement. Take your time with that phase, use the aggregate reports as your guide, and you will reach a fully enforced DMARC posture that protects your domain, meets Google's sender requirements, and qualifies your brand for BIMI logo display in Gmail.