What is a DMARC record?
A DMARC (Domain-based Message Authentication, Reporting, and Conformance) record is a DNS TXT entry published at _dmarc.yourdomain.com that tells receiving mail servers what to do when a message fails SPF and DKIM authentication checks. It specifies a policy (none, quarantine, or reject), reporting addresses for aggregate and forensic reports, and alignment requirements. Without a DMARC record, receiving servers have no policy guidance and make their own decisions about unauthenticated mail from your domain.
What is the difference between DMARC none, quarantine, and reject?
The p= tag sets the policy. 'none' means monitor only — emails pass regardless of authentication failures, but reports are generated. 'quarantine' means unauthenticated messages are sent to the spam folder. 'reject' means unauthenticated messages are refused outright. Most organizations start with none for monitoring, move to quarantine once they have confidence in their sending sources, then graduate to reject for maximum protection.
How do I look up a DMARC record?
Enter any domain into the analyzer above and click Analyze DMARC. The tool queries the DNS TXT record at _dmarc.yourdomain.com using live DNS over HTTPS lookups via Cloudflare DoH with Google DoH as fallback. Results appear within seconds. You can look up any domain -- your own or a competitor's -- as DMARC records are publicly accessible in DNS. No login or email address is required.
What is DMARC alignment?
Alignment means the domain in the From: header of the email must match the domain authenticated by SPF or DKIM. In relaxed alignment (the default), subdomains are accepted. In strict alignment, the domains must match exactly. The adkim= tag controls DKIM alignment and aspf= controls SPF alignment. If alignment fails on both mechanisms, DMARC fails regardless of whether SPF and DKIM individually pass.
What are DMARC aggregate reports (rua)?
Aggregate reports are XML files sent daily by major mail providers (Gmail, Outlook, Yahoo) to the address specified in rua=. They show how many messages were sent from your domain, which passed or failed SPF and DKIM, which senders were involved, and what policy action was applied. Setting up rua= is essential for understanding your email traffic before tightening your DMARC policy.
What are DMARC forensic reports (ruf)?
Forensic reports (specified in ruf=) contain details of individual authentication failures, including the message headers and sometimes the message body. They are sent in near real-time to the ruf= address when a message fails DMARC evaluation. Because forensic reports may contain sensitive email content, many receiving mail servers no longer send them due to privacy concerns. Aggregate reports (rua=) remain the primary monitoring mechanism for DMARC deployments and are supported by all major mail providers.
What does the pct= tag do in DMARC?
The pct= tag specifies what percentage of non-authenticating messages the policy should be applied to. For example, pct=10 means only 10% of failing messages are quarantined or rejected — the rest pass through as if the policy were 'none'. This allows gradual rollout of stricter policies. Once monitoring confirms no legitimate email is failing, increase pct to 100. Start with pct=10 and double it each week as you confirm authentic senders are passing authentication.
Why does my DMARC record show 'none' policy?
A 'none' policy is common when a domain has just set up DMARC and is in monitoring mode. It means authentication failures are logged in reports but not acted on. To actively protect your domain from spoofing and phishing, you need to progress to 'quarantine' and eventually 'reject' once you have reviewed your aggregate reports and confirmed all legitimate sending sources are properly authenticated.
Does DMARC work without SPF and DKIM?
DMARC depends on SPF and/or DKIM to function. A DMARC pass requires at least one of these mechanisms to pass with proper alignment. If neither SPF nor DKIM is configured, all email from your domain will fail DMARC. Set up SPF to authorize your sending servers and DKIM to cryptographically sign messages before implementing DMARC. SPF authenticates the envelope sender; DKIM authenticates the message content -- DMARC ties both together at the From: header level.
How is this DMARC analyzer different from mxtoolbox or dmarcian?
This tool runs directly in your browser using Cloudflare DNS-over-HTTPS — no server-side processing, no data collection, no signup. It provides plain-English analysis of every DMARC tag with specific actionable advice for each one. For organizations managing DMARC at scale with XML report ingestion and trend analytics, dedicated platforms like dmarcian offer additional features beyond what any free single-lookup tool provides.