What is DMARC (Domain-based Message Authentication)?

An email authentication protocol that builds on SPF and DKIM to give domain owners control over how unauthenticated emails from their domain are handled.

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that builds on SPF and DKIM to give domain owners explicit control over what happens when an email fails authentication checks. It is the policy layer that ties your entire email authentication stack together and provides visibility into who is sending email on behalf of your domain.

DMARC works by publishing a policy in your domain's DNS records that tells receiving mail servers how to handle messages that fail SPF or DKIM alignment. The three policy levels are "none" (monitor only, no enforcement), "quarantine" (send failing emails to spam), and "reject" (block failing emails entirely). Most organizations start with a "none" policy to gather data, then gradually move to "quarantine" and eventually "reject" as they gain confidence in their authentication setup.

The alignment requirement is what makes DMARC powerful. SPF and DKIM can each pass on their own, but DMARC requires that the domain in the SPF or DKIM check actually matches the domain in the visible "From" address. This closes the gap that SPF alone leaves open, where a spoofer could pass SPF using their own server but display your domain in the "From" field.

One of DMARC's most valuable features is its reporting capability. When you publish a DMARC record, receiving servers send aggregate reports (RUA reports) back to an email address you specify. These reports show which IP addresses are sending email using your domain, whether they pass or fail authentication, and what volume they send. This data is essential for identifying unauthorized senders, misconfigured legitimate services, and potential spoofing attacks.

For cold email teams, DMARC serves two critical purposes. First, it protects your domain reputation by preventing bad actors from spoofing your domain and generating spam complaints against you. Second, it signals to mailbox providers that you take email security seriously, which contributes positively to your sender reputation and deliverability.

Common mistakes with DMARC include jumping straight to a "reject" policy before confirming all legitimate sending sources pass authentication, ignoring the aggregate reports that reveal misconfigurations, and forgetting to update the DMARC record when adding new email services. Each of these can cause legitimate emails to be blocked.

Setting up DMARC properly requires first ensuring that your SPF and DKIM records are correctly configured and passing for all services that send email on your behalf. Once authentication is solid, publish a DMARC record starting with "p=none" and monitor reports for two to four weeks. Platforms like Supapitch check your DMARC configuration during onboarding and alert you if authentication failures are detected, helping you maintain strong deliverability throughout your campaigns.

Frequently asked questions

What does DMARC do?

DMARC ties SPF and DKIM together by telling receiving mail servers how to handle emails that fail authentication checks. It also provides reporting so you can see who is sending email using your domain and whether they pass or fail authentication.

How do I set up DMARC?

Add a DNS TXT record at _dmarc.yourdomain.com with a policy starting at 'v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com'. Monitor reports for 2-4 weeks, then gradually move to 'p=quarantine' and eventually 'p=reject'.

What DMARC policy should I use for cold email?

Start with 'p=none' to monitor without enforcement while you verify all legitimate sending sources pass SPF and DKIM. Once confirmed, move to 'p=quarantine' for better deliverability signals — mailbox providers view stricter DMARC policies as a trust signal.

Master your outreach with Supapitch

AI-powered email outreach that sounds like you, scales like a team.

Start free trial