Once you’ve published a basic DMARC record, the real work begins: implementing it correctly across all your domains and systems.
DMARC (Domain-based Message Authentication, Reporting & Conformance) works best when every mail source in your organization is authenticated, aligned, and monitored.
This guide goes beyond the basics to help you configure DMARC in DNS, manage multi-domain environments, and move safely from testing to full enforcement.
If your organization manages multiple domains or subdomains, treat DMARC as a long-term policy framework, not a one-off DNS record. Start by identifying:
It’s common for each department or business unit to have its own sending setup. But without a coordinated DMARC strategy, reports become fragmented and enforcement becomes risky.
Create an inventory of senders and decide which domain each will send from. This is your foundation for full compliance.
DMARC relies on SPF and DKIM to authenticate messages. If either one fails or isn’t aligned, DMARC will fail too.
Each domain should have a single SPF record listing all authorized senders:
v=spf1 include:_spf.google.com include:sendgrid.net include:mailgun.org -allBest practices:
-all to reject unauthorized senders.Each email-sending system (like HubSpot or Office 365) provides DKIM selectors to add to your DNS:
selector1._domainkey.yourdomain.comv=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9...
Confirm that:
Document every DKIM selector and associate it with a known sending source. This makes troubleshooting easier later.
DMARC records are TXT entries added to your DNS under _dmarc.yourdomain.com.
A solid starting point for implementation looks like this:
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; aspf=r; adkim=rLet’s break this down:
If you’re managing multiple domains, use unique report addresses to tell them apart:
rua=mailto:dmarc@corp.yourdomain.com,mailto:dmarc@reports.partner.comFor subdomains, you can publish a separate record (e.g. _dmarc.mail.yourdomain.com) or inherit the policy from the organizational domain.
Once live, mailbox providers will send you DMARC aggregate (RUA) reports daily, summarizing which IPs sent mail for your domain and how they performed.
Look for:
Each report line includes:
If a legitimate sender fails alignment, fix that before moving to enforcement.
For a deeper explanation, see our guide on How to Read DMARC Aggregate Reports.
Many DMARC issues stem from third-party platforms that send emails on your behalf, like marketing tools, CRMs, or payment processors.
To ensure these messages pass DMARC:
If a vendor doesn’t support DKIM alignment, SPF alignment must be perfect to avoid rejection.
Tip: Keep a shared internal list of all approved third-party senders and their DNS configurations.
Once your reports show all legitimate senders are authenticating correctly, start enforcing DMARC.
Transition gradually:
You can also test partial enforcement using the pct tag:
v=DMARC1; p=reject; pct=50; rua=mailto:dmarc-reports@yourdomain.comThis applies enforcement to 50% of traffic while monitoring results.
As you tighten enforcement, continue reviewing your reports daily.
Subdomains can either inherit your main policy or have their own. For example:
v=DMARC1; p=none; sp=reject; rua=mailto:dmarc-reports@yourdomain.comHere:
Use this when you’re testing on the main domain but want stricter enforcement for transactional subdomains like billing.yourdomain.com.
Even well-prepared teams make these errors:
rua tag (no reports).p=none).DMARC only protects you if it’s actively monitored and enforced. Leaving it at p=none indefinitely offers no protection against spoofing.
Once your DMARC policy is fully enforced, ongoing monitoring ensures everything stays healthy.
Regularly review:
DMARC isn’t a “set it and forget it” system. It’s an evolving part of your domain’s security posture.
For a complete roadmap of DMARC setup, to ongoing monitoring, and beyond, see our DMARC monitoring and compliance guide.
Setting up DMARC is one thing. Maintaining it across multiple domains and platforms is another. DMARCeye is an AI-powered DMARC monitoring and management platform that:
Easily see whether your implementation is working, which systems need adjustment, and how close you are to full compliance.