Validate your DMARC record and check policy enforcement level. Identifies missing records, weak policies set to 'none', and misconfigured alignment rules that leave your domain vulnerable to spoofing.
This tool checks one area. The full scan covers SSL, open ports, HTTP headers, breach exposure, subdomain enumeration, compliance mapping, and more — free, no login required.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that protects domains from unauthorized use in email spoofing and phishing attacks. It builds on two existing protocols — SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) — by adding a policy layer that tells receiving mail servers what to do when authentication checks fail.
Without DMARC, anyone can send email that appears to come from your domain. Phishing attacks using spoofed sender addresses account for over 90% of cyber attacks, and DMARC is the primary defense against this vector.
A DMARC record is published as a DNS TXT record at _dmarc.yourdomain.com. When a receiving mail server gets an email claiming to be from your domain, it checks this record to determine whether to deliver, quarantine, or reject the message.
DMARC verification follows a three-step process:
DMARC supports three enforcement levels, set via the p= tag in your DMARC record:
| Policy | Tag | Behavior | Protection Level |
|---|---|---|---|
| None | p=none | Monitor only — no action taken on failures | Observation only |
| Quarantine | p=quarantine | Failed emails sent to spam/junk folder | Moderate |
| Reject | p=reject | Failed emails blocked entirely | Maximum |
Most organizations should start with p=none to monitor authentication results, then progressively move to p=quarantine and finally p=reject once they've confirmed all legitimate email sources are properly authenticated.
| Tag | Required | Example | Purpose |
|---|---|---|---|
v | Yes | v=DMARC1 | Protocol version (must be DMARC1) |
p | Yes | p=reject | Policy for the domain |
sp | No | sp=quarantine | Policy for subdomains |
rua | Recommended | rua=mailto:dmarc@example.com | Aggregate report destination |
ruf | Optional | ruf=mailto:forensics@example.com | Forensic report destination |
pct | Optional | pct=100 | Percentage of messages subject to policy |
adkim | Optional | adkim=s | DKIM alignment mode (s=strict, r=relaxed) |
aspf | Optional | aspf=r | SPF alignment mode (s=strict, r=relaxed) |
fo | Optional | fo=1 | Failure reporting options |
Problem: Your domain has no _dmarc TXT record in DNS.
Impact: Any attacker can send email as your domain with no policy enforcement. Cyber insurance underwriters increasingly flag this as a disqualifying risk.
Fix: Add a TXT record at _dmarc.yourdomain.com with at minimum: v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com
Problem: DMARC is configured but set to monitoring mode only. Failed authentication has no consequences.
Impact: You get visibility into spoofing attempts but provide no protection. Cyber insurers and compliance frameworks (SOC 2, NIST CSF) increasingly require p=quarantine or p=reject.
Fix: After reviewing aggregate reports to confirm legitimate senders pass authentication, upgrade to p=quarantine, then to p=reject.
Problem: No rua= tag means you receive no reports about who is sending email as your domain.
Fix: Add rua=mailto:dmarc-reports@yourdomain.com to your DMARC record. Consider using a DMARC reporting service to parse the XML reports.
Problem: SPF passes but the authenticated domain doesn't match the From header domain.
Cause: Third-party email services (marketing platforms, CRMs, helpdesks) sending on your behalf with their own return-path domain.
Fix: Configure these services to use your domain as the return-path, or ensure DKIM alignment passes instead.
Problem: No sp= tag means subdomains inherit the parent domain's policy, which may not be appropriate.
Fix: Add sp=reject if you don't send email from subdomains, or set an appropriate policy for each subdomain.
Cyber insurance underwriters now scan applicant domains for DMARC enforcement before issuing or renewing policies. In our research scanning 73 domains across the insurance ecosystem, 41% had inadequate DMARC configuration.
Key requirements most insurers look for:
quarantine or reject (not none)Domains without DMARC enforcement face higher premiums, coverage exclusions, or outright denial of cyber insurance applications.
This tool queries your domain's DNS to retrieve and analyze the DMARC TXT record at _dmarc.yourdomain.com. It checks:
Results include a pass/warn/fail grade and specific remediation steps for any issues found. For a comprehensive assessment across all email security and infrastructure controls, run a full infrastructure risk scan.
To understand how SPF, DKIM, and DMARC work together and how to configure them for your clients, read our MSP guide to email authentication.