Generate a valid DMARC TXT record in seconds. Protect your domain from phishing and spoofing — free, instant, no account needed.
DMARC is just the first step. Warm up your inboxes, rescue emails from the spam folder, and build a trusted sending reputation — automatically. Used by thousands of cold emailers and sales teams worldwide.
DMARC — short for Domain-based Message Authentication, Reporting & Conformance — is an email authentication protocol that tells receiving mail servers what to do with emails that fail SPF or DKIM checks. Published as a DNS TXT record under _dmarc.yourdomain.com, a DMARC policy protects your domain from being impersonated in phishing attacks, business email compromise (BEC), and spam campaigns.
Without DMARC, any attacker can send emails that appear to come from your domain. This puts your brand reputation, customer trust, and email deliverability at serious risk. DMARC closes that gap by giving domain owners visibility and enforcement control over their email channel.
DMARC works alongside two complementary standards:
When both SPF and DKIM are in place, DMARC ties them together and adds enforcement policy and detailed reporting capabilities.
Generating a DMARC record takes under two minutes — no technical background needed.
example.com) without any prefix like "www" or "mail".none if you are new to DMARC (monitoring only). Move to quarantine or reject once you have reviewed your aggregate reports.Understanding each DMARC tag helps you craft a policy that fits your sending patterns precisely.
vDMARC1.v=DMARC1pp=quarantineruarua=mailto:dmarc@you.comrufruf=mailto:fail@you.compctpct=25adkimadkim=saspfaspf=rspp for subdomain mail.sp=rejectfofo=1Collect data without affecting any email delivery. Use this for 2–4 weeks before enforcing.
v=DMARC1; p=none; rua=mailto:dmarc@example.com;
Failing emails are moved to spam. The pct=50 tag applies the policy to only half of failing messages during rollout.
v=DMARC1; p=quarantine; pct=50; rua=mailto:dmarc@example.com; adkim=r; aspf=r;
Failing emails are blocked entirely. Only enable this once aggregate reports confirm all legitimate mail passes authentication.
v=DMARC1; p=reject; rua=mailto:dmarc@example.com; adkim=s; aspf=s;
A whitelist of IP addresses and mail servers allowed to send email for your domain. Validated during the SMTP handshake using the Return-Path header.
Weakness: SPF breaks when email is forwarded, and it does not protect the visible "From" address.
A cryptographic signature added to email headers. The public key is published in DNS; receiving servers use it to verify the signature and confirm the message was not modified in transit.
Strength: Survives forwarding. Does not require IP-based authorisation.
Ties SPF and DKIM together, requiring at least one to align with the visible "From" domain. Adds enforcement policy and detailed reporting so you know exactly who is sending email using your domain.
The missing layer: Without DMARC, SPF and DKIM alone cannot prevent "From" address spoofing.
If you send cold outreach or run lead generation campaigns, DMARC configuration is essential for landing in the inbox rather than the spam folder.
outreach.yourcompany.com.p=none — monitor email streams for 2–4 weeks before enforcing any policy on a new sending domain.adkim=r; aspf=r;) — strict alignment can break subdomain-level setups used by sequencing tools like Instantly and Smartlead.p=reject — without reviewing reports first, you risk blocking legitimate marketing tools, CRMs, or automated systems.rua tag.aspf=r) unless you have verified no forwarding occurs.sp tag or set separate DMARC records for each subdomain.p=none — monitoring mode provides no protection against spoofing. Plan to move to enforcement once your reports are clean.DMARC prevents spoofing — it does not guarantee inbox placement. Spam placement depends on content quality, sending reputation, and inbox warm-up. Use Warmbase to build sender reputation alongside your authentication setup.
DNS changes take up to 48 hours to propagate globally. Verify your record is live using dig _dmarc.yourdomain.com TXT or the MXToolbox DMARC Lookup.
Switch immediately to p=none and audit your aggregate reports. Identify all legitimate sending sources, ensure they have SPF or DKIM configured, then gradually re-enforce.
Usually caused by third-party tools (marketing platforms, CRMs, helpdesks) that lack DKIM or are not in your SPF record. Audit every service that sends email on behalf of your domain and configure them properly.
This happens when your email is forwarded or when a third-party service changes the Return-Path header. Switch to relaxed SPF alignment (aspf=r) to allow the mismatch, or ensure the third-party tool signs with DKIM so DMARC can pass via DKIM alignment instead.
DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication protocol that tells receiving mail servers how to handle emails that fail SPF or DKIM checks. You need it to prevent attackers from impersonating your domain in phishing attacks, and to gain full visibility into who is sending email on your behalf.
Yes — completely free, forever. No signup, no credit card, no usage limits. Generate DMARC records for as many domains as you need.
Always start with p=none (monitoring mode). This collects aggregate reports without impacting any email delivery. After 2–4 weeks of reviewing reports and confirming all legitimate mail passes authentication, move to p=quarantine, then eventually p=reject.
Yes. DMARC requires at least one of SPF or DKIM to pass and align with the visible "From" domain. Setting up DMARC without configuring SPF or DKIM first will result in very low pass rates, and if you use an enforcement policy, could inadvertently block legitimate email.
Log into your DNS provider (e.g. Cloudflare, GoDaddy, Namecheap), navigate to DNS Records, and add a new TXT record. Set the host to _dmarc and paste the generated value into the TXT value field. DNS propagation takes between 15 minutes and 48 hours.
Relaxed (r) allows the DKIM signing domain to be a parent domain of the From address domain. For example, a message DKIM-signed by mail.example.com will align with example.com. Strict (s) requires an exact match between the DKIM signing domain and the From domain.
In monitoring mode (p=none), DMARC has zero effect on delivery. In quarantine or reject mode, emails that fail authentication will be filtered or blocked — which is the intended behaviour to stop spoofing. A properly configured DMARC policy generally improves inbox placement by building trust signals with ISPs like Gmail and Outlook.
No. Only one DMARC record is allowed per domain. Multiple records cause unpredictable behaviour and will result in DMARC failing entirely for that domain. For subdomain-specific policies, create separate DMARC TXT records at the subdomain level (e.g. _dmarc.mail.example.com).
The rua tag specifies one or more email addresses where major ISPs (Gmail, Outlook, Yahoo, etc.) send daily aggregate DMARC XML reports. These reports contain data about which servers are sending email using your domain and whether they pass or fail SPF and DKIM checks. Reviewing these reports is the most important step when rolling out DMARC enforcement.
Yes, indirectly. Having DMARC, SPF, and DKIM all properly configured builds domain trust signals with ISPs like Google and Microsoft — a prerequisite for strong inbox placement. However, authentication alone is not sufficient for cold email. You also need inbox warm-up, strong sending practices, and quality content. Warmbase automates inbox warming to complement your authentication setup and maximise deliverability from day one.
You have your DMARC record — now finish the setup. Warmbase automatically warms up your sending inboxes so every cold email, outreach sequence, and transactional message lands in the inbox, not the spam folder.
Start Free Email Warmup →