{"id":30030,"date":"2024-06-12T09:19:00","date_gmt":"2024-06-12T09:19:00","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=30030"},"modified":"2025-08-29T13:57:38","modified_gmt":"2025-08-29T13:57:38","slug":"what-is-dmarc-a-bit-of-history","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/","title":{"rendered":"What is DMARC? \u2013 A Bit of History"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">DMARC is an acronym for Domain-based Message, Authentication, Reporting, and Conformance. But <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dmarc-overview\/\" target=\"_blank\" rel=\"noopener\"><b>what is DMARC<\/b><\/a><span style=\"font-weight: 400;\"> in practical terms?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s an open email authentication protocol that protects your company\u2019s email domain from\u00a0 email spoofing and fraud.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/how-to-implement-dmarc-with-easydmarc\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Implementing DMARC<\/span><\/a><span style=\"font-weight: 400;\"> keeps your domain safe from cyberattacks like Business Email Compromise, phishing, and other email scams.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Domain-based Message, Authentication, Reporting and Conformance protocol works alongside SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail) email protocols.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DMARC consists of two parts: Reporting and Conformance. Domain owners can monitor the authentication of their emails. At the same time, DMARC indicates what ISPs should do with unauthenticated emails.\u00a0<\/span><\/p>\n<p><b>What does <a href=\"https:\/\/easydmarc.com\/blog\/glossary\/dmarc\/\">DMARC<\/a> do? <\/b>T<span style=\"font-weight: 400;\">his protocol allows organizations to monitor and control who can send emails on behalf of their domain. As a business owner, you want to know that your clients only get legitimate emails from you. That\u2019s why every organization needs to implement a <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dmarc-policy\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC policy<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you use <\/span><a href=\"https:\/\/easydmarc.com\/blog\/easy-dmarc-email-protection-tools\/\" target=\"_blank\" rel=\"noopener\"><b>DMARC email security<\/b><\/a><span style=\"font-weight: 400;\">, you can tell recipients your emails are protected by <a href=\"https:\/\/easydmarc.com\/blog\/rackspace-spf-and-dkim-configuration\/\">SPF and DKIM<\/a> and inform them what to do if any authentication processes fail.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a <\/span><span style=\"font-weight: 400;\">\u00a0DMARC record example<\/span><span style=\"font-weight: 400;\">, you\u2019ll see three policies:: None, reject, and quarantine.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While knowing <\/span><span style=\"font-weight: 400;\">how DMARC works<\/span><span style=\"font-weight: 400;\"> is vital, in this article, we\u2019ll dive a bit into the history of DMARC\u2014how it began and its adoption process.<\/span><\/p>\n<h2><b>The Basis of DMARC: SPF and DKIM<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DMARC was built to extend two existing email authentication protocols &#8211; SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail). <\/span><span style=\"font-weight: 400;\">DMARC <\/span><span style=\"font-weight: 400;\">uses these protocols to determine the authenticity of a message.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The efforts to provide adequate email protection have a long history. It started with S\/MIME (Secure\/Multipurpose Internet Mail Extension) encryption and the popular digital signature standard during the 90s.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the early 2000s, new email authentication standards were developed. Among these standards, <a href=\"https:\/\/easydmarc.com\/blog\/elkdata-ou-spf-and-dkim-configuration\/\">SPF and DKIM<\/a> solved related email security issues. Let\u2019s briefly discuss them.<\/span><\/p>\n<h3><b>SPF<\/b><\/h3>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/what-is-sender-policy-framework-spf-a-bit-of-history\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">SPF<\/span><\/a><span style=\"font-weight: 400;\">, or Sender Policy Framework, is one of the first email authentication protocols introduced in the early 2000s. The idea came up when email experts realized that the SMTP (Simple Mail Transfer Protocol) couldn\u2019t protect users from email spoofing, so a need arose for a security mechanism.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SPF was initially called Sender Permitted Form or SMTP+SPF. The name was changed to Sender Policy Framework and published by the IETF as a proposed standard in 2014.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s an authentication method used to prevent email attacks like phishing and enhance domain reputation. The standard enables email servers to verify and authenticate the IP addresses of incoming messages.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still, SPF has its shortcomings. For example, forwarded messages fail authentication, SPF records are tricky to maintain, and hackers can still exploit the Return-Path\/mailfrom as most people don\u2019t check it.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">More than SPF on its own is needed to secure your email domain. That&#8217;s why knowing\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/easydmarc.com\/blog\/dmarc-step-by-step-guide\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">how to add a DMARC record in DNS<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0and implementing a DMARC policy is vital.<\/span><\/p>\n<h3><b>DKIM<\/b><\/h3>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\"> or DomainKeys Identified Mail, was created in 2014 as a combination of two existing email standards. The first standard is the Enhanced DomainKey developed by Yahoo! to confirm the integrity of an email message by authenticating the source DNS domain.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second standard is the Identified Internet Email, designed by Cisco, which authenticates the integrity of outgoing email using digital signatures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially, Gmail, Fastmail, AOL, and Yahoo! were the first to adopt this standard. Today, DKIM has experienced worldwide adoption, and it\u2019s recommended for all email providers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like SPF, DKIM helps protect your domain from unauthorized usage. The protocol ensures that emails remain unaltered while in transit between sender and receiver servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, hackers can still use DKIM signatures using malicious tactics. Once again, DKIM on its own doesn\u2019t provide sufficient email security. As such, <\/span><b>DMARC protection<\/b><span style=\"font-weight: 400;\"> is vital.<\/span><\/p>\n<h2><b>The Beginnings (2010-2012)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Even though <a href=\"https:\/\/easydmarc.com\/blog\/listrak-spf-and-dkim-configuration\/\">SPF and DKIM<\/a> provide a level of email security, they can only offer a partial solution to email authentication. This led to the development of Domain-based Message Authentication, Reporting and Conformance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DMARC&#8217;s journey started in 2010 when fifteen leading organizations, including PayPal, Microsoft, Google, and Yahoo, came together to build a protocol to guard against fraudulent emails on the internet.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the objectives of the collaboration was to ensure email receivers can provide sending servers with authenticated feedback regarding their messages to improve their authentication mechanism. The first publication of the DMARC specification came out on January 30th, 2012.<\/span><\/p>\n<h2><b>The Slow Adoption (2012-2017)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Though <\/span><b>DMARC protection<\/b><span style=\"font-weight: 400;\"> was created in 2010, it became an initiative in 2015 under the Trusted Domain Project. The adoption rate of the DMARC protocol was prolonged. Many organizations still need to be made aware of the DMARC protocol and its benefits. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the reasons why DMARC has a slow adoption rate is its technicality. Understanding email authentication requires a degree of technical knowledge, and it\u2019s not something organizations or marketers can implement on their own.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At least, that\u2019s how it used to be. With solutions like EasyDMARC, implementing everything from DMARC records and policies to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-are-dmarc-tags-dmarc-tags-explained\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC tags<\/span><\/a><span style=\"font-weight: 400;\"> and reporting is easy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But during the early days of DMARC, small organizations needed more experience to <a href=\"https:\/\/easydmarc.com\/blog\/oracle-rightnow-spf-and-dkim-configuration\/\">implement SPF and DKIM<\/a>. Of course, you need these two standards before effectively installing DMARC in your DNS.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2015 and 2016,\u00a0 <\/span><a href=\"https:\/\/dmarc.org\/2015\/10\/global-mailbox-providers-deploying-dmarc-to-protect-users\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Google and Yahoo<\/span><\/a><span style=\"font-weight: 400;\">! adopted strict DMARC policies, noting that people who refuse to follow the DMARC trend would have their business suffer for it soon.<\/span><\/p>\n<h2><b>DMARC Today and Beyond (2018-to date)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\">DMARC usage statistics<\/span><span style=\"font-weight: 400;\"> show that DMARC is rapidly rising, and many organizations are adopting this authentication standard to prevent email spoofing. In 2018, the Department of Homeland Security (DHS) mandated every federal agency to implement the use of DMARC, which positively impacted the adoption rate.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In December 2018, the DMARC adoption rate among federal government agencies increased to 47%. During this time, the DHS only directs agencies to implement DMARC at the p=none level, which still exposes the domain to phishing and spoofing attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Agari, around 53% of federal organizations don&#8217;t have a DMARC policy in place. Even those who do, the majority set their p=none, which doesn\u2019t protect their domain from spoofing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Valimain CEO Alexandra Garcia-Tobar said DMARC deployment is vital for businesses that operate in the United States and Europe because of their privacy laws.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Statistics also show that domains without <\/span><a href=\"https:\/\/easydmarc.com\/blog\/deploy-dmarc\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC deployment<\/span><\/a><span style=\"font-weight: 400;\"> are 4.75 times more likely to be victims of spoofing. In 2021, 43.4% of domains had enforced the DMARC policy, a 2% increase from the 2020 rate and a 3.5% increase from 2019.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These statistics show the adoption of the DMARC protocol is increasing. DMARC has been widely accepted by several large email providers like Microsoft, Google, and Yahoo!, catering for more than 85% of user inboxes globally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, the DMARC protocol is recognized among email marketers as an integral aspect of deliverability. Even the M3AAWG recommends enforcing DMARC as an <\/span><a href=\"https:\/\/easydmarc.com\/blog\/deliverability-matters-tips-to-avoid-the-spam-folder\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">email deliverability<\/span><\/a><span style=\"font-weight: 400;\"> best practice. A DMARC policy provides email authentication, which will be vital in the future.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sooner or later, email providers will move to the \u201cNo Auth, No Entry\u201d policy. This means your message will not be delivered if it doesn\u2019t satisfy DMARC requirements.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So if you want your message to get to your clients\u2019 inboxes, you need to enforce a DMARC policy in your domain. While this is still ongoing, it&#8217;s around the corner as the adoption of DMARC continues to increase globally.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It\u2019s no news that some dangerous cyberattacks, such as BEC and phishing, are delivered via email. So organizations need to implement DMARC to mitigate the impact of cybercrimes, including phishing, spoofing, brand abuse, and malware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, most businesses find it challenging to enforce DMARC policy. Conducting a <a href=\"https:\/\/easydmarc.com\/tools\/dmarc-lookup\">DMARC test email<\/a> can simplify this process. While this might seem like a daunting task, it\u2019s attainable. If you don\u2019t know the status of your <\/span><span style=\"font-weight: 400;\">DMARC record<\/span><span style=\"font-weight: 400;\">, you can perform a <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC record lookup<\/span><\/a><span style=\"font-weight: 400;\"> using our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC record generator<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With EasyDMARC&#8217;s all-in-one solution, you can protect your email domain and successfully monitor every area of your <a href=\"https:\/\/easydmarc.com\/blog\/ignoring-email-authentication-will-cost-you-time-and-sales\/\" target=\"_blank\" rel=\"noopener\">email authentication<\/a>, enforcing robust and effective protection against phishing, spoofing, and other email attacks.<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DMARC is an acronym for Domain-based Message, Authentication, &#8230;<\/p>\n","protected":false},"author":1,"featured_media":30127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,285,203],"tags":[],"class_list":["post-30030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dmarc","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is DMARC? \u2013 A Bit of History | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DMARC? \u2013 A Bit of History\" \/>\n<meta property=\"og:description\" content=\"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T09:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T13:57:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What is DMARC? \u2013 A Bit of History\",\"datePublished\":\"2024-06-12T09:19:00+00:00\",\"dateModified\":\"2025-08-29T13:57:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/\"},\"wordCount\":1360,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DMARC_-\u2013-A-bit-of-History.jpg\",\"articleSection\":[\"Blog\",\"DMARC\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/\",\"name\":\"What is DMARC? \u2013 A Bit of History | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DMARC_-\u2013-A-bit-of-History.jpg\",\"datePublished\":\"2024-06-12T09:19:00+00:00\",\"dateModified\":\"2025-08-29T13:57:38+00:00\",\"description\":\"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DMARC_-\u2013-A-bit-of-History.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-DMARC_-\u2013-A-bit-of-History.jpg\",\"width\":1440,\"height\":910,\"caption\":\"What is DMARC \u2013 A bit of History\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-dmarc-a-bit-of-history\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DMARC\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/dmarc\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What is DMARC? \u2013 A Bit of History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is DMARC? \u2013 A Bit of History | EasyDMARC","description":"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/","og_locale":"en_US","og_type":"article","og_title":"What is DMARC? \u2013 A Bit of History","og_description":"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2024-06-12T09:19:00+00:00","article_modified_time":"2025-08-29T13:57:38+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What is DMARC? \u2013 A Bit of History","datePublished":"2024-06-12T09:19:00+00:00","dateModified":"2025-08-29T13:57:38+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/"},"wordCount":1360,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","articleSection":["Blog","DMARC","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/","url":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/","name":"What is DMARC? \u2013 A Bit of History | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","datePublished":"2024-06-12T09:19:00+00:00","dateModified":"2025-08-29T13:57:38+00:00","description":"Explore the history of DMARC and how it evolved into a crucial email authentication protocol, helping secure domains from phishing and spoofing attacks.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","width":1440,"height":910,"caption":"What is DMARC \u2013 A bit of History"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-dmarc-a-bit-of-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"DMARC","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/dmarc\/"},{"@type":"ListItem","position":5,"name":"What is DMARC? \u2013 A Bit of History"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-DMARC_-\u2013-A-bit-of-History.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=30030"}],"version-history":[{"count":6,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30030\/revisions"}],"predecessor-version":[{"id":51743,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30030\/revisions\/51743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/30127"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=30030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=30030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=30030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}