DMARC Record
Checker

Validate DMARC policies and protect your domain from spoofingMonitor email authentication and get reporting insights

Policy Validation
Alignment Check
Report Analysis

Check DMARC Record

Validate DMARC policy and email authentication alignment

Policy Analysis

Check enforcement level and percentage

Report Settings

Verify RUA and RUF email addresses

Alignment Mode

Check SPF and DKIM alignment settings

New to DMARC?

DMARC protects your domain from email spoofing and phishing. InboxKit helps you implement DMARC correctly with monitoring and reporting.

Get DMARC Protection

DMARC Implementation Guide

Domain-based Message Authentication, Reporting & Conformance explained

DMARC Implementation Journey

1

Setup SPF

Authorize senders

2

Setup DKIM

Sign emails

3

DMARC p=none

Monitor only

4

p=quarantine

Spam folder

5

p=reject

Full protection

DMARC Tags Explained

v=DMARC1 - Version (required)
p= - Policy: none, quarantine, reject (required)
rua= - Aggregate reports email
ruf= - Forensic reports email
pct= - Percentage to apply (1-100)
sp= - Subdomain policy
adkim= - DKIM alignment (r=relaxed, s=strict)
aspf= - SPF alignment (r=relaxed, s=strict)

Benefits of DMARC

  • Protects brand from email spoofing
  • Improves email deliverability
  • Provides visibility into email ecosystem
  • Reduces phishing attacks
  • Meets compliance requirements
  • Builds sender reputation

What is DMARC and Why It Matters

DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication protocol that builds upon SPF and DKIM to provide domain owners with a mechanism to protect their domain from unauthorized use, commonly known as email spoofing. DMARC enables domain owners to specify how receiving mail servers should handle messages that fail authentication checks.

Google and Yahoo DMARC Requirements 2024

As of February 2024, Google and Yahoo require all bulk senders (sending 5,000+ emails per day) to implement DMARC authentication. This requirement helps combat spam and phishing while improving overall email ecosystem security. Domains without proper DMARC configuration may experience significant delivery issues to Gmail and Yahoo Mail recipients.

DMARC Best Practices

  • Start with p=none to monitor without affecting delivery
  • Analyze reports for at least 2-4 weeks before enforcement
  • Gradually increase policy strength (none → quarantine → reject)
  • Use percentage (pct) to slowly roll out stricter policies
  • Set up both aggregate (rua) and forensic (ruf) reporting
  • Monitor third-party senders and add them to SPF/DKIM
  • Keep alignment mode relaxed initially (aspf=r, adkim=r)
  • Document all legitimate email sources before enforcement

Common DMARC Mistakes to Avoid

Many organizations rush DMARC implementation without proper preparation. Going directly to p=reject without monitoring can block legitimate emails from partners, marketing platforms, or automated systems. Always start with p=none, analyze your email ecosystem through DMARC reports, and gradually increase enforcement. Missing legitimate senders in your SPF and DKIM configurations is the most common cause of DMARC failures.

Get Complete DMARC Protection

InboxKit provides automated DMARC deployment with real-time monitoring and expert support