- Home
- DMARC Record Generator
DMARC Record Generator is a tool designed to simplify the creation of a properly formatted DMARC record for your domain
Create a valid DMARC record
Begin Your Email Security Journey With Our DMARC Analyzer
DMARCtron’s DMARC Record Checker is a robust and intuitive tool designed for seamless DMARC validation and record testing. With this diagnostic tool, you can effortlessly perform a DMARC lookup to verify the authenticity and proper configuration of your DMARC records.
Once the DMARC checker highlights any configuration issues, our platform equips you with the necessary tools and an actionable roadmap to resolve them. With DMARCtron, achieving full DMARC compliance and enhancing your email security is simple and efficient.
Focus on driving results
Our quick time and proactive approach assist our clients to rehearse the future and outperform the competition.
Automated DMARC enforcement for DNS configuration
A full-service DMARC implementation and management. Complete each step of your DMARC authentication task directly with DMARCtron managed DMARC solution.

- Find your answer
Read most frequent questions
DMARC Tag Explanations
DMARC Record Checker will display the following tags.
TAG | TAG DESCRIPTION |
---|---|
v(required) | The version tag. The only allowed value is "DMARC1". If it's incorrect or the tag is missing, the DMARC record will be ignored. |
p(required) | The DMARC policy. Allowed values are "none", "quarantine", or "reject". The default is "none," which takes no action against non-authenticated emails. It only helps collect DMARC reports and gain insight into your current email flows and their authentication status. "quarantine" marks the failed emails as suspicious, while "reject" blocks them. |
rua | Aggregate report sending destination. It's the "mailto:" URI that ESPs use to send failure reports. The tag is optional, but you won’t receive reports if you skip it. |
ruf | Forensic (Failure) report sending destination. It's the "mailto:" URI that ESPs use to send failure reports. The tag is optional, but you won’t receive reports if you skip it. |
sp | The subdomain policy. The subdomain inherits the domain policy tag (p=) explained above unless specifically defined here. Like the domain policy, the allowed values are "none," "quarantine," or "reject." This option isn't widely used nowadays. |
adkim | The DKIM signature alignment. This tag follows the alignment between the DKIM domain and the parent Header From domain. Allowed values are "r" (relaxed) or "s" (strict). "r" is the default and allows a partial match, while the "s" tag requires the domains to be the same. |
aspf | The SPF alignment. This tag follows the alignment between the SPF domain (the sender) and the Header From domain. Allowed values are "r" (relaxed) or "s" (strict). "r" is the default, and allows a partial match, while the "s" tag requires the domains to be exactly the same. |
fo | Forensic reporting options. Allowed values are "0," "1," "d," and "s." "0" is the default value, which generates a forensic report when both SPF and DKIM fail to produce an aligned pass. If either of the protocol outcome is something other than pass, use "1." "d" generates a report when DKIM is invalid, while "s" does the same for SPF. Define the ruf tag to receive forensic reports. |
rf | The reporting format for failure reports. Allowed values are "afrf" and "iodef". |
pct | The percentage tag. This tag works on domains with "quarantine" or "reject" policy only. It marks the percentage of failed emails a given policy should be applied to. The rest falls under a lower policy. For example, if "pct=70," on a domain with "quarantine" policy, it applies only 70% of the time. The remaining 30% goes under "p=none". Similarly, if "p=reject" and "pct=70," "reject" applies to the 70% of failed emails, and the 30% go into "quarantine." |
ri | Reporting interval. Marks the frequency of received XML reports in seconds. The default is 86400 (once a day). Regardless of the set interval, in most cases, ISPs send the reports at different intervals (usually once a day). |
adkim | The DKIM signature alignment. This tag follows the alignment between the DKIM domain and the parent Header From domain. Allowed values are "r" (relaxed) or "s" (strict). "r" is the default and allows a partial match, while the "s" tag requires the domains to be the same. |
Q. What Is DMARC Record Lookup Tool?
The DMARCtron Record Checker is a free, online DMARC diagnostic tool designed to help you verify and validate your domain’s DMARC record. This tool provides a comprehensive DMARC verification process, ensuring your domain’s email authentication is properly configured.
Simply enter your domain name, and the tool will retrieve your DMARC record, delivering a detailed analysis of its configuration. With the DMARCtron Record Checker, you can:
- Quickly identify any issues or misconfigurations in your DMARC record.
- Gain actionable insights to ensure proper setup and compliance with industry standards.
- Strengthen your domain’s email security and protect against phishing and spoofing attacks.
Take advantage of this powerful tool to optimize your DMARC implementation and enhance your domain’s email authentication framework.
Q. Why Check your DMARC record?
DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication, policy, and reporting protocol designed to protect domains from unauthorized email use. By generating a DMARC record and adding it to your DNS as a TXT record, domain administrators can:
Define Policies for Unauthorized Emails: Specify how email receivers should handle messages that fail authentication checks (e.g., SPF or DKIM).
Receive Detailed Reports: Gain visibility into your outgoing email infrastructure, including insights into legitimate and unauthorized email activity.
DMARC empowers organizations to enhance email security, prevent phishing and spoofing attacks, and maintain the integrity of their domain’s email communications.
Q. Why are DMARC reports important?
DMARC reports are essential for achieving successful DMARC enforcement, particularly when working toward a p=reject policy. These reports serve as a valuable data source, offering detailed insights into your domain’s outgoing email ecosystem. Key information provided includes:
- Legitimate and Unauthorized Sources: Identify which sources are authorized to send emails on behalf of your domain and detect unauthorized or fraudulent activity.
- Email Sending Volume: Understand the volume of emails being sent using your domain.
- Failure Reasons: Pinpoint the reasons why certain emails fail authentication checks (e.g., SPF or DKIM failures).
By analyzing this data, you can develop a targeted action plan to address vulnerabilities, authenticate legitimate sources, and swiftly progress toward DMARC enforcement. Ultimately, this ensures compliance with email authentication standards and strengthens your domain’s security posture.
Q. What does DMARC compliant mean?
DMARC compliance means that your outgoing email server is fully authenticated and aligned with either SPF (Sender Policy Framework) or DKIM (DomainKeys Identified Mail) authentication protocols. This ensures that emails sent from your domain meet the required standards for authentication, reducing the risk of phishing, spoofing, and other email-based threats. Achieving DMARC compliance is a critical step in securing your email infrastructure and maintaining the trustworthiness of your domain.
Q. How does DMARC work?
In summary, DMARC serves as a directive within a domain’s DNS that specifies how receiving mail servers should handle emails originating from unauthorized sending sources. Below is an overview of the process:
- DMARC Implementation : The domain administrator configures a DMARC TXT record in the domain’s DNS, incorporating both required and recommended tags, such as version (
v
), policy (p
), and reporting parameters (rua
andruf
). This establishes the rules that receiving servers will enforce. - Email Authentication and Alignment : Upon receipt of an email, the receiving server evaluates it against the DMARC policy by verifying SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) authentication mechanisms, as well as ensuring proper alignment between these protocols and the domain’s DMARC record.
- DMARC Reporting : If the DMARC record includes the reporting tags (
rua
for aggregate reports andruf
for forensic reports), the domain administrator will begin receiving detailed DMARC reports. These reports provide insights into email traffic patterns and potential authentication issues. - Policy Enforcement and Optimization : The next phase involves analyzing the data from these reports to assess source alignment. Based on the findings, the administrator can progressively adopt a stricter enforcement policy—initially transitioning to a “quarantine” policy, followed by a “reject” policy—to ensure comprehensive protection against unauthorized email activity.
By leveraging tools like DMARCtron, administrators can streamline this process, ensuring robust email security while maintaining compliance with industry best practices.
Q. What does DMARC domain alignment mean?
Domain Alignment is a fundamental concept in DMARC (Domain-based Message Authentication, Reporting, and Conformance) that ensures the authenticity of the sender’s identity. It verifies that the domain in the visible “From” header of an email is indeed the legitimate sender of the message.
This alignment process involves two key components:
- SPF Alignment : The domain used in the SPF (Sender Policy Framework) check—typically derived from the Envelope From (also known as the Return-Path address)—must align with the domain in the visible “From” header. This ensures that the email originates from an authorized source as defined by the domain’s SPF record.
- DKIM Alignment : The domain specified in the DKIM (DomainKeys Identified Mail) signature (
d=example.net
) must also match the domain in the visible “From” header. This confirms that the email has been signed by the same domain that claims to have sent it.
When both SPF and DKIM are properly aligned with the “From” domain, DMARC considers the email authenticated. This alignment mechanism helps prevent email spoofing and phishing attacks by ensuring that the email’s purported sender is the actual sender. Tools like DMARCtron can assist administrators in monitoring and enforcing these alignment policies, thereby enhancing email security and trustworthiness.
Q. How does a DMARC work with subdomains?
By default, a DMARC record or policy applied at the root domain level will automatically extend to all subdomains unless an explicit DMARC record is configured for specific subdomains. This means that if no separate DMARC policy is defined for a subdomain, the root domain’s DMARC settings will govern how email authentication and alignment are handled for that subdomain.
However, administrators have the flexibility to define distinct DMARC policies for individual subdomains by publishing separate DMARC records at the subdomain level. This allows for granular control over email security practices, enabling tailored enforcement of SPF, DKIM, and alignment rules for different subdomains as needed.
Leveraging tools like DMARCtron can simplify the management of these policies, ensuring consistent enforcement across both root domains and subdomains while providing detailed insights into authentication results and potential misconfigurations.
Q. Can I Add a DMARC Record Without DKIM?
Technically, it is possible to implement a DMARC record without configuring a DKIM record. However, for DMARC to pass successfully, at least one of the two authentication mechanisms—SPF (Sender Policy Framework) or DKIM (DomainKeys Identified Mail)—must be properly authenticated and aligned with the domain in the “From” header.
At DMARCtron, we strongly recommend that organizations adopt a comprehensive approach to email authentication by setting up both SPF and DKIM before implementing DMARC. This ensures a more robust foundation for email security and minimizes the risk of false positives, blocked legitimate emails, or unintended disruptions to your domain’s email ecosystem.
Following industry best practices for email authentication not only enhances deliverability but also safeguards your domain against spoofing, phishing, and other malicious activities. By taking a proactive and structured approach to SPF, DKIM, and DMARC implementation, you can maintain the integrity of your domain’s email communications while avoiding potential pitfalls that could harm your organization’s reputation or operational efficiency.
With DMARCtron, you can streamline this process, ensuring that your email infrastructure adheres to the highest standards of security and compliance.
Haven’t found an answer to your query?
Contact Us
- Tools