Answering Your Webinar Questions: Risk-Free DMARC Enforcement

6 Min Read

During our recent webinar, “Risk-Free DMARC Enforcement: The Ins and Outs of DMARC Policies,” we covered a wide range of topics on DMARC and successful enforcement. We had a fantastic Q&A session, but there were still some interesting questions that we couldn’t address due to time constraints.

In this blog post, we’ve brought together the most intriguing unanswered questions from the webinar and provided detailed answers to help you deepen your understanding of DMARC, email security, and best practices. 

Q&A from the Webinar

Will DMARC help with the deliverability of email forwarders? I have around 130 email forwarders that do not always get delivered to our email accounts. It happens most commonly with Gmail, but can happen with other email providers, too.

It can help, but DMARC alone doesn’t fix forwarding because SPF breaks and DKIM often gets modified. The reliable solution is to preserve DKIM and/or enable ARC on the forwarding servers. That’s what improves Gmail delivery the most.
In forwarding scenarios, DKIM is more reliable than SPF, because SPF will always fail once the message is resent by another server. As long as DKIM is configured correctly and passes both authentication and alignment, DMARC can still pass, and the emails can be delivered successfully.

What is the advice on DMARC policies for small businesses that have clients with email general domains like gmail.com, outlook.com, or hotmail.com?

You can’t publish or enforce DMARC for those domains; only the domain owner can. So your DMARC policy applies only to your own business domain.

How does this work for emails set up on a web host? For example, my company uses Bluehost for the website, and our emails are set up through them, too. How does dmarc enforcement work in this case?

DMARC is set in your domain’s DNS, so it works the same even if your email is hosted with Bluehost. As long as Bluehost is included in your SPF and DKIM is enabled for your domain, your legitimate emails will pass DMARC.

How do we know when to move from p=none to p=quarantine and when to move to p=reject? What metrics do I need to monitor?

Move to DMARC enforcement when your reports show that all legitimate sending sources are passing authentication — ideally with DKIM alignment (and SPF where possible) — and any remaining failures are only from unauthorized sources.

How is BIMI related to DMARC, and is it worth setting up?

BIMI works on top of DMARC. You must have DMARC enforcement (p=quarantine or p=reject) for BIMI to display your logo in supporting inboxes. You can read about BIMI here in this article.

Right now, we’re using SendGrid. Is there any other way to improve DMARC? 

Move to DMARC enforcement once all legitimate mail sent through SendGrid (and any other approved services) is consistently passing SPF and especially DKIM with alignment, and you have dedicated DMARC RUA and RUF addresses in place to receive and analyze the reports so you have a complete overview of all sending sources and can properly authenticate and align them before enforcing.

We’ve been on p=quarantine for 6+ months, and we have a DMARC alignment rate of 96%, so we’re considering moving to p=reject. What will happen to “forwarded” emails when using p=reject?

Forwarding typically breaks SPF, so as long as the original message keeps a valid, aligned DKIM signature, it will still pass DMARC and be delivered; only forwarded messages without aligned DKIM (and no ARC to vouch for them) are likely to be rejected.

External verification failed! To receive DMARC Aggregate reports at “***@nctius.com” email, you must publish a “v=DMARC1” TXT record for the “jxncti.com._report._dmarc.nctius.com” subdomain. Ensure proper configuration for DMARC reporting. 

This can be resolved by checking this article.

SPF & DKIM configuration – how much does it impacts DMARC configuration? Any recommendations you can share?

SPF and DKIM are the foundation of DMARC — without them properly configured, DMARC cannot pass, and enforcement will break legitimate mail. To better understand this topic, check out this article on SPF, DKIM & DMARC.

 If I never send emails from a domain, what’s the best setting?

If your domain never sends email, the best practice is to set its DMARC policy to p=reject and ensure valid RUA and RUF addresses so you can monitor and receive reports of any spoofing attempts.

Why do most mail servers do not send failure reports (ruf tag)? 

Most mail servers don’t send DMARC failure (RUF) reports because they contain sensitive information, including the From/To addresses and the full content of the email, which could expose users’ data and compromise message integrity, so major providers generally don’t support them.

Do I need to review the email sent XML, or just look in my EasyDMARC dashboard?

As long as your RUA and RUF addresses are included in your DMARC record, you don’t really need to manually review the raw XML reports. EasyDMARC will automatically parse them into a human-readable dashboard that shows all sending sources, pass/fail status, and alignment, so you can monitor everything without opening the XML files.

Can you comment on SPF All tag qualifiers? 

The SPF all qualifier determines how strict receiving servers should treat mail from IPs not listed in your SPF record. Read more here in this article.

Could you elaborate a bit on the difference between SPF Authentication and Alignment, please?

SPF Pass/Fail results depend on two factors: Authentication and Alignment.
Authentication: Confirms that the sending IP or host is authorized to send email for the domain listed in the SPF record. For example, if an email is sent from example.com, SPF checks whether that IP is included in the SPF record for example.com.
Alignment: Ensures that the domain in the visible From: header aligns with the domain used for SPF authentication (MAIL FROM / Return-Path). For instance, if the email’s From: address is [email protected], the SPF authentication must pass for a domain that matches or is properly aligned with example.com to satisfy DMARC.

I get domain reports in xml or other formats that I cannot read. Are there human-readable domain reports?

DMARC reports are XML documents that provide information about the authentication status of DMARC, SPF, and DKIM. Sign up for free and start reading your DMARC reports with EasyDMARC’s report analyzer. 

Final Thoughts

DMARC enforcement is still one of the most misunderstood and delayed steps in email security. Not because organizations don’t know what DMARC is but because enforcing policies is often seen as risky, complex, and easy to get wrong.

If you’d like to go deeper, explore our knowledge base, take a free consultation with our team, or check out our platform to simplify and strengthen your email security journey.

DMARC Implementation Senior Engineer at EasyDMARC
Nshan helps companies grow by deploying DMARC Policy for their business domains as a security layer, which helps mail administrators prevent hackers and other attackers from spoofing their organization and domain.
Comments
guest
0 Comments
Inline Feedbacks
View all comments

succees We’re glad you joined EasyDMARC newsletter! Get ready for valuable email security knowledge every week.

succees You’re already subscribed to EasyDMARC newsletter. Continue learning more about email security with us