Skip to content

How to setup DMARC

Start with creating email for reports, usually a shared mailbox with an email postmaster@company.com.

Monitor results

Create a TXT file in your DNS: Hostname _dmarc (So the hostname is _dmarc.company.com) Value: v=DMARC1; p=none; rua=mailto:postmaster@company.com; ruf=mailto:postmaster@company.com TTL: 1 hour

The best practice is to have this on for a month to get reports on how your email domain is being used.

It's nice to use powerdmarc.com for reading results. The trial should be enough to see if it's safe to lock down the domain.

Lock it down

When you are ready to lock down your domain you want something like this: v=DMARC1; p=reject; pct=100; rua=mailto:postmaster@company.com; ruf=mailto:postmaster@company.com;

v=DMARC1: DMARC version p=reject: Policy is to reject all email that does not comply with SPF and DKIM rules pct=100: Reject 100% of emails that break the rules, you can have this 50/50 if you like but email probably goes to junkmail. rua=mailto:postmaster@company.com: Report to postmaster email

v: Protocol version v=DMARC1 pct: Percentage of messages subjected to filtering pct=20 ruf: Reporting URI for forensic reports ruf=mailto:authfail@example.com rua: Reporting URI of aggregate reports rua=mailto:aggrep@example.com p: Policy for organizational domain p=quarantine sp: Policy for subdomains of the OD sp=reject adkim: Alignment mode for DKIM adkim=s aspf: Alignment mode for SPF aspf=r

More advanced example, SPF relaxed + DKIM strict: v=DMARC1; p=quarantine; sp=reject; adkim=s; rua=mailto:postmaster-rua@company.com; ruf=mailto:postmaster-ruf@company.com; pct=100; fo=0:1:d:s; Created with powerdmarc.com.