Skip to main content
  • For Support:

    815-308-2095

  • New Client
    815-788-6041

How Do I Add DMARC To My Email? (Step‑By‑Step 2026 Guide)

May 21, 2026

If you’re asking “how do i add dmarc to my email,” the answer is simpler than it sounds: you do not add it inside Gmail, Outlook, or Apple Mail. You publish a DNS rule for your sending domain. In this guide, you’ll learn how to create, publish, verify, and safely enforce DMARC without accidentally blocking legitimate business email. Follow this link to learn what DMARC does, For troubleshooting, see why emails fail DMARC, and for a protocol comparison, see DMARC vs DKIM.

Key Takeaways

  • Adding DMARC means publishing a dmarc txt record in your DNS hosting provider, not changing a setting in your email client.
  • Before creating a DMARC record, SPF and DKIM must be successfully configured for the domain, because DMARC depends on spf and dkim alignment with the visible From address.
  • The basic path is: generate your own dmarc record, add it at _dmarc.yourdomain.com in DNS, start with p=none, then move to p=quarantine and p=reject.
  • DMARC aggregate reports, also called dmarc reports, show which services send mail for your domain and whether they pass authentication.
  • DNS changes can take a few minutes or up to 24–48 hours to propagate, so always verify your new dmarc record with an online checker.

What Is DMARC And Why You Should Add It

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email security protocol that protects domains from phishing, spoofing, and business email compromise. In simple terms, SPF verifies whether the sending mail servers are authorized, DKIM verifies the message with a cryptographic signature, and DMARC, sometimes called domain based message authentication, tells receiving mail servers what to do if the message does not pass.

Inbox providers use your domain’s dmarc record to make delivery decisions. For example:

  • Gmail, Yahoo, Outlook.com, Microsoft 365, Apple Mail, and other providers run dmarc checks when email messages arrive.
  • If the message passes DMARC, the recipient’s mail server is more likely to trust it.
  • If the message fails DMARC, your dmarc policy tells receiving mail servers whether to allow, quarantine, or reject it.
  • DMARC records are DNS TXT records, which means they live in your domain’s dns, not inside your email app.

Major mailbox providers tightened DMARC-related requirements for bulk sender traffic between 2024 and 2026. Google and Yahoo began requiring authentication for high-volume senders in 2024, while Microsoft introduced stricter consumer-mail requirements in 2025. Google’s own email sender guidelines now make SPF, DKIM, and DMARC part of baseline sender hygiene for many bulk senders.

That matters because spoofed email is not theoretical. Attackers can send fake invoices, CEO fraud requests, or phishing messages that appear to come from your own domain. So when someone asks how to configure dmarc, what they really mean is: how do I publish an explicit dmarc record for my own domain?

Prerequisites Before You Add A DMARC Record

Do not jump straight to a strict dmarc enforcement policy. Implementing DMARC requires a careful, staged approach to avoid blocking legitimate business emails, especially if your company uses multiple platforms to send mail. For organizations subject to regulatory requirements, proper email authentication is also part of IT compliance.

First, confirm that you control DNS for the sending domain. That may be through a domain registrar such as GoDaddy or Namecheap, a dns provider like Cloudflare or Amazon Route 53, a domain host, a dns hosting provider, or a hosting panel such as cPanel or Plesk. You need access to the domain’s dns settings and the domain’s dns records to add or edit authentication rules.

Next, identify every legitimate sender that can send mail using your domain. This often includes:

  • Google Workspace or Microsoft 365
  • CRM and sales tools
  • Marketing platforms
  • Billing and invoicing systems
  • Helpdesk platforms
  • Transactional email service providers
  • Website forms and ecommerce systems

You should already have a valid spf record and dkim records configured for the domain.

Before creating a dmarc record, check your spf or dkim records. If either is missing or misconfigured, legitimate messages may fail dmarc once enforcement begins.

Step 1: Check If You Already Have A DMARC Record

Before adding anything new, check whether a dmarc record already exists. Many domains already have a monitoring record created by an IT provider, email platform, or past domain administrator.

Use a public DMARC checker or DNS lookup tool such as MXToolbox, Google Admin Toolbox, or a similar lookup service. Query:

_dmarc.yourdomain.com

You may see one of three results:

  • No record found, which means you need to create a new dmarc txt record.
  • A monitoring record such as v=DMARC1; p=none; rua=….
  • An enforcement record using p=quarantine or p=reject.

There must be only one dmarc txt record at _dmarc. If one exists, edit the existing domain’s dmarc record instead of adding a second one. Multiple records at the same host value can cause dmarc validation to fail.

Before making changes, copy the current record into a document. That gives you a rollback point if a syntax mistake causes dmarc authentication problems.

Step 2: Understand DMARC TXT Record Basics

A typical dmarc record is a single line of text made of tag value pairs. It is published as a txt record in DNS at _dmarc.example.com, not at the bare domain example.com.

The two mandatory tags are:

TagMeaning
v=DMARC1The dmarc version. This must appear exactly as shown.
p=The dmarc policy: none, quarantine, or reject.

Common optional tags include:

  • rua= – where aggregate reports should be sent.
  • ruf= – where forensic reports may be sent.
  • pct= – the percentage of mail subject to the policy.
  • aspf= – SPF alignment mode.
  • adkim= – DKIM alignment mode.

The pct tag in a DMARC record allows domain owners to specify the percentage of emails that should be subjected to the DMARC policy, enabling a phased approach to enforcement.

A best-practice monitoring record for 2026 might look like this:

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; adkim=s; aspf=s; pct=100

This is the dmarc txt value. The DNS host/name field is usually _dmarc, and the full hostname becomes _dmarc.yourdomain.com.

Step 3: Decide On Your Initial DMARC Policy

DMARC policies can be set to three different levels: none, quarantine, and reject, allowing domain owners to control how receiving mail servers handle emails that fail authentication checks.

Here is the difference:

  • p=none means monitor only. Messages are not blocked by DMARC, but you receive dmarc data.
  • p=quarantine means suspicious messages should be placed in the spam folder or junk folder.
  • p=reject means failed messages should be blocked entirely.

Start with p=none for new deployments, consistent with CISA’s guidance on DMARC implementation. Keeping the none policy active for 2 to 4 weeks is recommended to monitor and adjust legitimate mail streams. During that period, your goal is to find every legitimate sender and fix anything that would fail authentication checks.

Do not begin with p=reject unless you are certain every platform is correctly configured. Otherwise, important email messages such as invoices, password resets, support replies, and sales follow-ups may be rejected.

Step 4: Use a DMARC Record Generator or Build Your Own

You can write a dmarc record manually or use a dmarc record generator. A generator asks for your policy, reporting address, alignment settings, and rollout percentage, then returns a ready-to-copy dns txt record.

Decide these inputs first:

  • Policy: p=none, p=quarantine, or p=reject
  • Aggregate report address: rua=mailto:dmarc@yourdomain.com
  • Optional forensic report address: ruf=mailto:forensics@yourdomain.com
  • Alignment settings: aspf=r or aspf=s, and adkim=r or adkim=s
  • Percentage: pct=100, or a lower number during rollout

Create a dedicated email address to receive reports rather than using an individual’s inbox. High-volume domains generate a large number of XML reports from receiving servers worldwide.

A simple starter record:

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; pct=100

A stricter quarantine-stage record:

v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.com; adkim=s; aspf=s; pct=100

Copy the final value exactly. Do not add line breaks, smart quotes, missing semicolons, or extra spaces inside email addresses.

Step 5: Add The DMARC Record At Your DNS Hosting Provider

The exact interface varies by provider, but the core fields are almost always the same:

  1. Log in to your dns hosting provider.
  2. Open the DNS zone for the sending domain.
  3. Find the dns records tab or DNS management page.
  4. Click Add Record.
  5. Choose TXT as the record type.
  6. Enter _dmarc as the host value.
  7. Paste your dmarc txt value into the value/content field.
  8. Set TTL to the provider default or something common like 1 hour.
  9. Save the record.

If you are configuring a subdomain, the host may be _dmarc.subdomain. For example, the parent domain example.com may use _dmarc.example.com, while a custom domain such as news.example.com may use _dmarc.news.example.com.

Provider screens differ across Cloudflare, Route 53, GoDaddy, Namecheap, Microsoft, and hosting accounts, but the fields remain the same: type, host, value, and TTL.

Step 6: Verify Your DMARC Record And DNS Propagation

DNS changes do not appear everywhere instantly. Some updates show within minutes, while others take up to 24–48 hours because of TTL values, resolver caching, and mail servers checking at different times.

Use a DMARC record lookup tool to query:

_dmarc.yourdomain.com

Confirm that the result matches your expected dmarc txt record and has no syntax errors. Look for these mistakes:

  • Missing v=DMARC1
  • Missing p=
  • Typos such as vrua instead of rua
  • Invalid report email addresses
  • Multiple dmarc records stored at the same hostname
  • Publishing the record at the root instead of _dmarc

Then send mail from each sending domain or platform to Gmail, Outlook.com, Yahoo, and iCloud test inboxes. Open the headers and look for Authentication-Results. You want to see results such as dmarc=pass, pass spf, or valid dkim authentication.

If an email fails dmarc while you are still using p=none, do not panic. That is the point of monitoring. Your next task is to find out why the message did not pass dmarc and whether SPF, DKIM, or dmarc alignment needs fixing.

Step 7: Read DMARC Reports And Fix DMARC Alignment

DMARC aggregate reports are daily XML summaries sent by receiving servers, showing which sources send mail for your domain and whether messages passed or failed SPF and DKIM checks.

These aggregate reports usually include:

  • Sending ip address and source
  • Number of messages seen
  • SPF result
  • DKIM result
  • DMARC disposition
  • Header From domain
  • Alignment outcome
  • Whether messages pass dmarc or fail dmarc

DMARC alignment is the key concept. SPF authentication checks the Return-Path domain, while DKIM checks the d= domain in the dkim signature. For DMARC to pass, either SPF or DKIM must pass and align with the visible From domain.

Review aggregate reports weekly to identify legitimate third-party tools that fail authentication. A dmarc analyzer or report viewer can turn raw XML into charts, source lists, and failure summaries.

Use the reports to find:

  • Missing SPF includes
  • Missing dkim records for third-party services
  • A legitimate sender using its own domain instead of yours
  • Forwarding paths that break SPF
  • Unauthorized systems sending unauthenticated mail
  • Misconfigured email service providers

This is where you protect only legitimate email without hurting email deliverability.

Step 8: Move From Monitoring To DMARC Enforcement

DMARC enforcement means changing your policy from p=none to p=quarantine, and eventually to p=reject.

A staged rollout is safest:

  1. Start at p=none for 2 to 4 weeks.
  2. Move to p=quarantine; pct=10 or pct=25.
  3. Watch dmarc failures for a couple of weeks.
  4. Increase pct to 50, then 100.
  5. Move to p=reject when legitimate mail is stable.

If a marketing platform, billing tool, or support desk begins to fail dmarc checks, pause the rollout and fix the sending configuration before increasing enforcement.

The benefits are worth it. Strong dmarc compliance can block spoofed mail, reduce spam messages pretending to be your company, protect brand trust, and improve inbox placement for authenticated campaigns. A cybersecurity services provider can manage the entire DMARC lifecycle from initial deployment through enforcement. For a bulk sender, this is no longer just a security project; it is part of modern deliverability.

DMARC is not a set-it-and-forget-it control. Review reports whenever you add a new vendor, change email infrastructure, rotate keys, or send mail from a new platform.

Common DMARC Setup Mistakes To Avoid

Many domains either stay at p=none forever or break legitimate mail because of avoidable errors. The most common mistakes are simple but damaging.

Avoid these:

  • Publishing more than one dmarc txt record at _dmarc.
  • Forgetting required tags such as v=DMARC1 and p=.
  • Mistyping tag names, such as vrua instead of rua.
  • Adding the record to the wrong hostname.
  • Using p=reject before SPF and DKIM are aligned.
  • Forgetting low-volume tools such as newsletters, ticketing systems, invoicing tools, and website forms.
  • Ignoring reports after publishing the record.

Another common issue is relying on only one mechanism. SPF can break when mail is forwarded, and DKIM can fail if a system modifies the message. That is why you should review spf dkim and dmarc as one system, not as separate checkboxes.

If legitimate mail goes to the recipient’s spam folder after enforcement, inspect headers and reports. The message may fail dmarc because the Return-Path, DKIM signing domain, or visible From domain is not aligned.

How DMARC Works With SPF And DKIM

DMARC does not replace SPF or DKIM. It coordinates SPF and DKIM results, checks alignment, and applies your published policy.

SPF is published as a DNS TXT record, usually at the root domain. A normal spf record begins with v=spf1 and lists authorized senders by hostname, include mechanism, or ip address. If the sending server is authorized and the Return-Path domain aligns with the From domain, SPF can contribute to a DMARC pass.

DKIM, short for domainkeys identified mail, adds a cryptographic dkim signature to the message header. The public key is stored in DNS under a selector such as:

selector._domainkey.example.com

The receiver checks the signature using the public key. If dkim authentication passes and the DKIM signing domain aligns with the From domain, dkim alignment can satisfy DMARC.

DMARC can pass if either SPF or DKIM passes and aligns with the From domain, even if the other mechanism fails. For long-term stability, DKIM is usually more resilient than SPF because forwarding often breaks SPF.

Review SPF, DKIM, and DMARC whenever you move infrastructure, change providers, add a new custom domain, or rotate keys.

Where Are DMARC Records Stored? SPF And DKIM Locations

DMARC, SPF, and DKIM are stored in DNS. More specifically, DMARC and SPF are usually dns txt record entries, while DKIM may be a TXT record or a CNAME pointing to a provider-managed key.

Here is where dmarc records stored and related authentication records usually live:

RecordTypical locationPurpose
SPFexample.comLists authorized senders
DMARC_dmarc.example.comDefines reporting and policy
DKIMselector._domainkey.example.comStores or points to the public DKIM key

Common DNS hosts include Cloudflare, GoDaddy, Namecheap, Microsoft, Amazon Route 53, and web hosting accounts. If your domain registrar is separate from your DNS provider, make changes where the active nameservers point, not necessarily where you bought the domain.

Control over dns records is control over email authentication. Restrict access to trusted administrators and document every active SPF, DKIM, and DMARC entry. Good documentation prevents future changes from breaking dmarc settings, dmarc validation, and email deliverability.

FAQ

How long does it take for a new DMARC record to start working?

A new DMARC record starts working as soon as it is published and receiving servers can see it. In practice, global DNS propagation can take several hours and sometimes up to 24–48 hours. Providers like Cloudflare or Route 53 often update quickly, but remote resolvers may cache old values until the TTL expires. Wait a few hours, then check _dmarc.yourdomain.com with more than one lookup tool.

Can I use DMARC without setting up DKIM?

Technically, DMARC can pass with SPF alone if SPF passes and aligns with the visible From domain. However, relying only on SPF is fragile because forwarding can break SPF. You should deploy DKIM alongside SPF before moving beyond p=none. One exception is a non-sending domain, which can publish p=reject without SPF or DKIM to block spoofed traffic.

Do I need a different DMARC record for each subdomain?

A single organizational record at _dmarc.example.com can apply to subdomains by default. However, subdomains can override that policy with their own dmarc record. Use separate records for high-volume or special-purpose subdomains such as mail.example.com or news.example.com if they use different sending platforms. Document every sending subdomain and the policy that applies to it.

What should I do with DMARC aggregate reports once I receive them?

Review aggregate reports weekly with a DMARC report viewer. Identify unknown IPs, confirm whether each legitimate sender is authenticated, and fix missing SPF includes or DKIM records. The reports help you decide when it is safe to move from monitoring to quarantine or reject. They also alert you when a new provider, attacker, or misconfiguration appears.

Will adding a DMARC record improve my email deliverability immediately?

A basic p=none record mostly improves visibility, not deliverability, because it does not change how failing messages are handled. Deliverability gains usually come after you correctly configure SPF and DKIM, align them with the From domain, and move toward enforcement. Mailbox providers increasingly reward authenticated domains, especially after the 2024–2026 bulk sender requirements. Start with monitoring, fix failures, then enforce with confidence.

LeadingIT is a cyber-resilient technology and cybersecurity services provider. With our concierge support model, we provide customized solutions to meet the unique needs of nonprofits, schools, manufacturers, accounting firms, government agencies, and law offices with 25–250 users across the Chicagoland area. Our team of experts solves the unsolvable while helping our clients leverage technology to achieve their business goals, ensuring the highest level of security and reliability. Call us at 815-788-6041 or contact us today.

Let Us Be Your Guide In Cybersecurity Protections
And IT Support With Our All-Inclusive Model.