DMARC
Also known as: Domain-based Message Authentication, Reporting and Conformance, DMARC record, DMARC policy
DMARC is an email authentication policy that tells inbox providers what to do when a message fails SPF or DKIM checks against your domain.
Definition
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a published DNS record that instructs receiving mail servers how to handle email claiming to come from your domain when it fails SPF or DKIM verification. It also tells those servers where to send forensic and aggregate reports about authentication results.
In practice, your DMARC record sits as a TXT entry at _dmarc.yourdomain.com and specifies a policy — none, quarantine, or reject — along with a reporting address. When a campaign goes out, mailbox providers like Gmail and Outlook check whether SPF and DKIM align with the From domain, then apply your DMARC policy if alignment fails.
DMARC is not a filter or a spam blocker — it's an enforcement layer that sits on top of SPF and DKIM. SPF authorizes which IPs can send, DKIM cryptographically signs the message, and DMARC ties them to the visible From address and dictates the consequence for failures.
Why It Matters
Without an enforced DMARC policy, anyone can spoof your domain to phish your customers, vendors, or employees — and you'll never know it's happening. Beyond security, Google and Yahoo now require DMARC for any sender pushing more than 5,000 messages a day to their inboxes, meaning your outbound campaigns will silently land in spam or get rejected outright if the record is missing or misconfigured.
Teams that ignore DMARC tend to discover the problem only after a deliverability collapse: open rates drop overnight, sales sequences stop landing, and the support inbox fills with customers reporting fake invoices sent in your name. Fixing it reactively is far slower than building it correctly the first time, because reputation damage with inbox providers takes weeks to repair.
Examples in Practice
A 40-person B2B SaaS company launches cold outbound from a new subdomain. Because they publish DMARC at p=reject with proper SPF and DKIM alignment from day one, their messages authenticate cleanly at Gmail and Microsoft, and reply rates stay above industry benchmarks instead of getting filtered to spam.
A mid-market ecommerce brand discovers that fraudsters are sending fake shipping notifications from their domain. After publishing a DMARC record at p=quarantine and reviewing the aggregate reports, the ops team identifies the spoofing source and tightens the policy to p=reject, killing the phishing campaign within two weeks.
A professional services firm with multiple sending tools — billing, CRM, marketing automation, and HR — turns on DMARC monitoring at p=none first. The reports surface three legitimate vendors that weren't properly aligned, letting them fix DKIM signing before stepping the policy up to quarantine without breaking real email.