DMARC's whole point is enforcement. The record tells receiving mail servers what to do with messages that fail authentication: send them to spam with p=quarantine, or refuse them outright with p=reject. Until a domain reaches one of those policies, DMARC is just visibility. Useful, but not protection. Q1 2026 data from DMARCeye's monitoring platform shows that more than a third of DMARC-engaged domains never get there.
This article unpacks the policy-distribution finding from DMARCeye's Q1 2026 industry report. The full report, with all 12 chart views and methodology, is below.
Among the thousands of domains DMARCeye actively monitors, the policy split looks like this:
p=none: monitor-only. A DMARC record exists, but receivers aren't being told to do anything when authentication fails.p=quarantine: failed messages go to spam.p=reject: full enforcement. Failed messages are refused.About a third of monitored domains are still in the visibility phase. Only about a quarter have reached full enforcement. The middle tier, quarantine, is the largest single bucket.
This picture is for domains already engaged with DMARC. The full report compares the engaged group to a separate scanner sample of public-facing internet domains. In that sample, 28% of domains have no DMARC record at all.
A DMARC record at p=none tells receiving servers: "if a message fails SPF and DKIM alignment, deliver it anyway, but send a report." The domain owner gets visibility, both into legitimate mail from forgotten services and into impersonation attempts. But no blocking happens. A spoofed message reaches the inbox just like a legitimate one would.
Monitor-only is a fine starting point. You can't safely tighten policy without monitoring data first. But sitting at p=none indefinitely means you're collecting evidence of impersonation and never doing anything about it.
For most companies, the practical risk of staying at p=none shows up in three places:
p=none with reporting meets the minimum. Their filtering algorithms still factor DMARC posture into delivery decisions, and a record that publishes but never enforces sits in the "compliant on paper" tier.For an e-commerce shop sending order confirmations and shipping updates, this looks like: legitimate transactional mail gets harder to deliver over time, while spoofed mail still hits your customers' inboxes. Damaged sender reputation is slow to repair once it tips.
The Q1 report shows the what. It does not tell us why any specific domain remains at monitor-only. The reasons below are patterns we see across customers, not findings from the dataset. Treat them as informed guesses to check against your own situation:
The report shows that the gap exists. The causes are worth investigating in your own setup.
The path from p=none to p=reject is well-documented and does not require a leap of faith:
p=quarantine first. Mail that fails goes to spam, not to /dev/null. Watch reports for a week or two. Confirm legitimate mail still passes.p=reject. If you've done step 2 right, the shift is mostly invisible.One related finding from the Q1 report: only about 6% of enforcing domains use DMARC's built-in pct= tag for staged percentage rollout. Most teams jump straight from p=none to full enforcement at 100%. The forthcoming DMARCbis revision of the standard removes pct= entirely, which makes "do the prep" the binary path.
If you want a worked walkthrough, our complete DMARC implementation guide covers the full process.