Back to blog
Authentication··4 min read·WillItInbox Team

DMARC rollout: from p=none to p=reject without breaking mail

The exact six-week schedule for moving from monitoring-only DMARC to full enforcement, with the report-reading checkpoints that keep you safe.

DMARCAuthentication

DMARC enforcement is the single most consequential email change you'll ever make. Done right, you eliminate domain spoofing forever. Done wrong, you reject your own legitimate mail. The difference is entirely about how patient you are with the rollout.

What DMARC actually does

DMARC sits on top of SPF and DKIM. It does two things: tells receivers what to do when authentication fails, and asks them to send aggregate reports. Crucially, DMARC requires that the From-header domain align with either the SPF authenticated domain or the DKIM signing domain. Either passing is enough.

The starting record

DNS record
HostTypeValueTTL
_dmarc.example.comTXTv=DMARC1; p=none; rua=mailto:[email protected]; ruf=mailto:[email protected]; fo=1; adkim=r; aspf=r3600
Day-one DMARC record. Monitoring only, no enforcement.
  • `p=none` — monitoring only. Receivers report failures but don't act on them.
  • `rua=` — aggregate report destination. Daily summaries from each receiver.
  • `ruf=` — forensic report destination. Per-message failure details (most receivers no longer send these for privacy reasons).
  • `fo=1` — forensic on any failure (vs default 0, which only reports if everything fails).
  • `adkim=r` / `aspf=r` — relaxed alignment. Subdomains of the From domain count as aligned.

Tag reference

TagValuesWhat it does
vDMARC1Required version tag
pnone / quarantine / rejectPolicy for the main domain
spSame as pPolicy for subdomains (defaults to p)
ruamailto: URIAggregate report destination
rufmailto: URIForensic report destination
pct0100Percent of failing mail to apply policy to
adkimr (relaxed) / s (strict)DKIM alignment mode
aspfr / sSPF alignment mode
fo0 1 d sForensic reporting trigger
Every DMARC tag you'll actually use.

The six-week rollout

From monitoring to enforcement

  1. 01

    Week 1 — Publish p=none

    Set up an inbox or DMARC report processor (free options: dmarcian, EasyDMARC, Postmark DMARC Digests). Publish the monitoring record. Verify with dig +short txt _dmarc.example.com.

  2. 02

    Week 2 — Read the reports

    Aggregate reports arrive daily. You'll discover senders you didn't know existed: SaaS tools, marketing automation, that one Cron job from 2019. Make a list. For each, decide: legitimate (fix auth), illegitimate (block at source), or shadow IT (have a conversation).

  3. 03

    Weeks 3–4 — Fix every legitimate sender

    Add their IPs to SPF or get them DKIM-signing. Verify each fix in the next week's reports. Do not move forward until every legitimate sender is producing aligned passes.

  4. 04

    Week 5 — Move to quarantine with pct=10

    Change to p=quarantine; pct=10. Only 10% of failing mail will be quarantined; the rest passes through with a none action. Watch reports for any dropped legitimate sender.

    v=DMARC1; p=quarantine; pct=10; rua=mailto:[email protected]
  5. 05

    Week 6 — Ramp pct to 100

    If reports look clean, raise pct= to 25, then 50, then 100, in 3-day intervals. After a week at pct=100; p=quarantine, you can move to p=reject for full enforcement.

    v=DMARC1; p=reject; rua=mailto:[email protected]

Reading aggregate reports

Aggregate reports are gzipped XML files emailed daily by each receiver. Manually reading XML is masochism — use a processor. The data you care about: which IPs are sending as your domain, what their auth result was, and whether they're aligned.

ResultWhat it meansAction
SPF pass + aligned, DKIM pass + alignedHealthy senderNone
SPF fail, DKIM pass + alignedForwarded mailUsually fine; DKIM survives forwarding
SPF pass but unalignedSender uses your IP but their own domainFix their config or remove from SPF
Both failEither spoof or misconfigured legitimate senderInvestigate immediately

Frequently asked questions

Keep reading