DMARC is simply a short instruction you publish in DNS. It tells receiving mail servers how to treat messages that pretend to be you and how to send you summary reports when something looks off.
It does not reroute, delay, or expose your emails. When DMARCFlow sets it up, mail keeps flowing as usual while you gain full visibility into spoofing attempts.
How it works
Think of DMARC as a policy note shared with the entire email ecosystem. It links your existing SPF and DKIM checks and spells out how to handle suspicious traffic.
You add one TXT entry under _dmarc.yourdomain.com. It lists a policy (monitor, quarantine, or reject) and where reports should go. No servers are moved.
When Gmail, Microsoft, or another provider receives your mail, they verify whether the SPF sender and DKIM signature align with your domain.
Their systems send aggregated XML reports. Each line is a count of attempts per source IP – never the body of any message.
We review your existing DNS, stage DMARC in monitor mode, and then tighten the policy only when we know every legitimate sender passes.
Mail is delivered, but spoofing attempts go unnoticed. You have no reporting or enforcement.
We publish DMARC with p=none (monitoring). You receive reports, and we clean up SPF/DKIM gaps without touching your content.
Once everything authenticates, we move to quarantine/reject. Legitimate traffic keeps flowing, while spoofed messages finally fail.
Privacy promises
The only data we receive are aggregated XML lines such as “250 messages from 203.0.113.10 passed”. There is no subject line, attachment, or body inside.
Think of it as delivery receipts – enough to prove authenticity, never enough to read a single message.
DMARC reports group messages by source. They cannot be traced back to individual employees or customers.
No mail is rerouted through DMARCFlow. Every message still goes directly from your server to the recipient.
If you ever want to pause enforcement, changing the policy value in DNS is enough.
We document every change for auditors so you can show exactly who touched which record.
Next step
We roll out the policy, monitor the reports, and show you proof that nothing about your email traffic becomes readable or risky.