Understanding DMARC Policies and the Path to Enforcement
Domain-based Message Authentication, Reporting and Conformance (DMARC) helps domain owners stop exact-domain impersonation, improve deliverability, and gain visibility into who sends email on their behalf. DMARC works on top of SPF and DKIM and instructs receivers what to do when a message fails authentication and alignment. This article explains each DMARC policy and outlines a safe, auditable path to enforcement, with practical notes on how DMARCFlow streamlines the journey.
What DMARC Policies Do
A DMARC record is a DNS TXT record that includes tags describing how receivers should treat
failing messages. The most important tag is p (policy):
| Policy | Effect on Failing Mail | When to Use |
|---|---|---|
p=none |
No delivery action taken; receivers deliver as usual. You receive aggregate (RUA) reports (and optional forensic RUF) for visibility. | Initial monitoring and discovery. Do not stay here indefinitely; users remain exposed to spoofing if you never move forward. |
p=quarantine |
Receivers place failing mail in spam or quarantine. | Intermediate stage to test enforcement while you fine-tune alignment and reduce false positives. |
p=reject |
Receivers reject failing mail at the gateway. | Target end state for anti-impersonation once legitimate senders pass SPF or DKIM with alignment. |
A Step-by-Step Path to Enforcement
- Publish
p=nonewith reporting. Start with RUA (and optionally RUF). Confirm that reports arrive and are parsed. - Inventory and authenticate all senders. For each service that sends as your
domain, configure SPF and DKIM. Ensure alignment: the Return-Path domain (SPF) and DKIM
d=domain should align with the visible From domain. - Use
pctto phase in enforcement. Addpct=25(or similar) while still onp=noneplusspfor subdomain control if needed. Validate impact and raisepctgradually. - Move to
p=quarantine. When compliance is high (many teams target 98%+ of legitimate mail passing), set quarantine. Continue monitoring bounces and spam-folder impacts. - Raise to
p=reject. Once you are confident legitimate sources pass and align, switch to reject. Keep monitoring for newly discovered senders or configuration drift. - Maintain and improve. Treat DMARC as a program: rotate DKIM keys, review SPF lookups, audit new vendors, and watch for shadow IT and lookalike domains.
Key DMARC Tags to Know
rua=Aggregate report destination(s).ruf=Optional forensic report destination(s) where permitted.pct=Percentage of failing mail to which the policy applies (useful for staged rollout).sp=Subdomain policy (can differ from parent domain).aspf=andadkim=Alignment modes (relaxed or strict) for SPF and DKIM.fo=Failure reporting options (forensically, where allowed).
Common Pitfalls (and How to Avoid Them)
- Staying on
p=noneforever. Monitoring is not protection. Define milestones to reach quarantine and reject. - SPF too many DNS lookups. Refactor overly long SPF records; use include hygiene and guardrails.
- Misaligned DKIM. Ensure the DKIM signing domain is organizationally aligned with the From domain.
- No owner for a sender. Assign business and technical ownership to each mail source.
- Ignoring subdomains. Use the
sptag for subdomain policy and discover auto-created or legacy subdomains.
How DMARCFlow Supports the Journey
DMARCFlow is designed around the real-world path to enforcement: discover, authenticate, enforce, and maintain. Plans map to operational maturity and scale.
Standard Plan (fast start)
Specs: 5 domains, 3 users, 12-month data retention, up to 300k DMARC messages per month.
Features: RUA plus optional RUF ingestion; dashboards and trend analytics; source discovery; policy progression (none to quarantine to reject); alerts (anomalies, new senders, auth failures); PDF/CSV exports and scheduled summaries; webhook for basic automation; two-factor authentication; geo-maps; automatic subdomain discovery; safe SPF checks (linting, read-only guidance); basic MTA-STS and TLS-RPT visibility; multilingual UI; 8x5 email support; 99.99% uptime (Critical: 4 h; High: 1 business day). Price: 45 USD/month or 460 USD/year (–15%).
Enterprise Plan (scale and governance)
Specs: 25 domains, 10 users, 36-month data retention, up to 3M DMARC messages per month.
Features: Advanced RBAC and audit log; SSO (SAML/OIDC) and SCIM; advanced API (write where applicable); native connectors (Splunk, QRadar, Elastic); ticketing integrations (Jira, ServiceNow); data residency options (e.g., EU); RUF processing and viewer; dynamic and safe SPF management (flattening, auto-includes, lookup guardrails, suggested records); domain blacklist and brand-lookalike monitoring; adaptive alerts (Slack, Teams, SIEM); workspace and domain groups with granular access; BIMI readiness checks; MTA-STS and TLS-RPT hosting; 24x7 critical support with named TAM; 99.99% uptime (Critical: 30 min; High: 2 h). Price: 300 USD/month or 3,000 USD/year (–15%).
Enterprise+ Plan (outcomes and operational assistance)
Specs: Unlimited domains, 100 users, 60-month data retention, custom DMARC volume.
Features: Dedicated DMARC engineer and CSM; hands-on rollout (SPF clean-up, DKIM keying, staged enforcement); weekly operational check-ins and monthly executive reports; BIMI readiness and VMC coordination; threat intelligence and IP reputation enrichment; managed DKIM (key rotation); managed SPF (policy automation); quarterly executive business reviews and roadmap; custom data retention and BYO storage; named on-call escalation; multi-year discounts; 24x7 named escalation; custom runbooks and response SLAs; quarterly posture reviews; 99.99% uptime. Price: 500 USD/month or 5,000 USD/year (–15%).
Bonuses for Enterprise and Enterprise+
- Onboarding workshop (4 h remote)
- 30-day evaluation window (cancel anytime within 30 days)
- Monthly executive reports (deliverability, threat trends, ROI)
- Quarterly security briefings (threats and actions)
- Managed DNS updates and continuous monitoring
- Executive threat-simulation session (annual) with bespoke training plan
Takeaways
- Enforcement is the goal: reject stops exact-domain spoofing.
- Use pct, quarantine, and subdomain policy to de-risk the journey.
- Treat DMARC as an ongoing program, not a one-time project.
- DMARCFlow aligns features and support with each enforcement milestone, from first reports to full reject across many domains.