{"id":3556,"date":"2023-08-31T11:16:15","date_gmt":"2023-08-31T08:16:15","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=3556"},"modified":"2023-08-31T11:27:54","modified_gmt":"2023-08-31T08:27:54","slug":"what-is-dmarc-and-how-does-it-work","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/","title":{"rendered":"What is DMARC and How Does it Work"},"content":{"rendered":"\n<p>Email continues to be a crucial distribution channel for cyber threats and attacks like spear phishing. Impersonating well-known companies and sources in spoof emails is a growing trend. These can be used to spread malware, steal credentials, or carry out various types of online crimes and attacks.<\/p>\n\n\n\n<p>One of the most effective protocols available today to combat email spoofing is <strong>DMARC<\/strong> (Domain-based Message Authentication, Reporting, and Conformance). DMARC builds on earlier email authentication methods like SPF and DKIM to provide a multilayer defense against unauthorized use of domains in email. When implemented correctly, <a href=\"https:\/\/www.mailsafi.com\/email-security\">DMARC can stop spoofed emails in their tracks<\/a>.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69dd27bb21175\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69dd27bb21175\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#What_is_DMARC_and_How_Does_it_Work\" title=\"What is DMARC and How Does it Work?\">What is DMARC and How Does it Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#DMARC_Reporting_for_more_email_Visibility\" title=\"DMARC Reporting for more email Visibility\">DMARC Reporting for more email Visibility<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#Aggregate_DMARC_Reports\" title=\"Aggregate DMARC Reports&nbsp;\">Aggregate DMARC Reports&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#Forensic_DMARC_reports\" title=\"Forensic DMARC reports&nbsp;\">Forensic DMARC reports&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#Why_DMARC_is_Important_for_Email_Security\" title=\"Why DMARC is Important for Email Security\">Why DMARC is Important for Email Security<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#1_Prevents_spoofing_and_phishing\" title=\" 1. Prevents spoofing and phishing\"> 1. Prevents spoofing and phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#2_Drives_adoption_of_authentication\" title=\"2. Drives adoption of authentication&nbsp;\">2. Drives adoption of authentication&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#3_Provides_visibility\" title=\"3. Provides visibility\">3. Provides visibility<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#4_Flexible_policy_controls\" title=\"4. Flexible policy controls\">4. Flexible policy controls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#5_Increased_user_trust\" title=\"5. Increased user trust&nbsp;\">5. Increased user trust&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#6_Industry_Momentum\" title=\"6. Industry Momentum&nbsp;\">6. Industry Momentum&nbsp;<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_DMARC_and_How_Does_it_Work\"><\/span><strong>What is DMARC and How Does it Work?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DMARC is an email validation system that verifies the authenticity of the sending domain. The domain owner creates a DMARC DNS TXT record for their domain. This record tells receiving mail servers what to do if an incoming email fails validation &#8211; either reject, quarantine or monitor only.<\/p>\n\n\n\n<p>SPF and DKIM are used to <a href=\"https:\/\/mailsafi.com\/blog\/email-authentication-the-anti-phishing-solution\/\">authenticate the domain that sent an email<\/a>. SPF checks that the sending IP address is authorized by the domain&#8217;s SPF record. DKIM checks that the email headers and body have not been modified in transit using a digital signature.<\/p>\n\n\n\n<p>The DMARC TXT record includes several tags:<\/p>\n\n\n\n<ul>\n<li><strong>v<\/strong> &#8211; Version of DMARC being used<\/li>\n\n\n\n<li><strong>p<\/strong> -Requested handler policy (reject, quarantine, monitor)<\/li>\n\n\n\n<li><strong>pct<\/strong> &#8211; Percentage of messages subjected to policy<\/li>\n\n\n\n<li><strong>ruf<\/strong> &#8211; URI for aggregate feedback reports<\/li>\n\n\n\n<li><strong>rua<\/strong> &#8211; URI for message-specific forensic reports<\/li>\n<\/ul>\n\n\n\n<p>The DMARC policy published in a domain&#8217;s DNS tells receiving mail servers what to do if neither SPF nor DKIM authentication passes for an email claiming to be from that domain. For example, the policy could be &#8220;quarantine&#8221; or &#8220;reject&#8221;. DMARC analyzes the authentication results from SPF and DKIM, and If neither passes and the DMARC policy is &#8220;reject&#8221;, the email is rejected rather than delivered. This prevents spoofing of the domain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DMARC_Reporting_for_more_email_Visibility\"><\/span><strong>DMARC Reporting for more email Visibility<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>One of DMARC&#8217;s key benefits is the full email authentication reporting it gives sender domains. This information provides anti-phishing defenses with previously unheard-of visibility into email spoofing attempts.<\/p>\n\n\n\n<p>There are two main types of DMARC reports: Aggregate reports&nbsp; and Forensic reports<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Aggregate_DMARC_Reports\"><\/span><strong>Aggregate DMARC Reports<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>An aggregate DMARC report, often prepared daily, weekly, or monthly, offers a thorough summary of email authentication results and actions done on messages based on the published DMARC policy over a specific period. The report includes a statistical overview, including the total number of messages examined, the quantity and percentage of messages that passed or failed DMARC alignment via SPF and DKIM, and a breakdown of the actions taken, such as rejections, quarantines, or rewrites. IP addresses, domain names, and geographic information are given in the source data for sources that fail authentication.&nbsp;<\/p>\n\n\n\n<p>The report also provides granular data on the percentage of emails that passed DKIM only, SPF only, both, or neither, and the specific DKIM and SPF results. Recommendations are outlined for improving DMARC effectiveness based on the aggregated data. Raw XML data contains underlying record-level details not in the report summary which can be parsed programmatically. Reviewing the wealth of information in periodic aggregate reports is essential for monitoring the health of DMARC policies and fine-tuning <a href=\"https:\/\/mailsafi.com\/blog\/cracking-the-code-how-to-protect-your-emails-from-sneaky-security-threats\/\">protections against email threats<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Forensic_DMARC_reports\"><\/span><strong>Forensic DMARC reports<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Forensic DMARC reports include comprehensive records on each email message that failed SPF or DKIM alignment for a particular domain, offering thorough information to aid in investigating and resolving DMARC authentication problems. These reports are generated by email receivers and providers for example, Gmail or Microsoft, and can be requested by adding a &#8220;ruf&#8221; tag to a domain&#8217;s DMARC DNS TXT record.&nbsp;<\/p>\n\n\n\n<p>Forensic reports include the full message headers, source IP addresses, failure reason codes (e.g. SPF permerror), and snippets of email content to aid analysis. They help identify patterns in email spoofing attempts against a domain and pinpoint specific configuration problems leading to DMARC failures. Forensic reports are typically provided in a compressed CSV or XML data format and can encompass a high volume of records, requiring filtering to focus on suspicious traffic. While aggregate reports give a high-level view, forensic reports drill down into granular details on individual DMARC authentication failures to uncover email threats.<\/p>\n\n\n\n<p>The forensic and aggregate reports offer priceless visibility at both a wide and detailed level. DMARC senders can track the results of authentication over time to find problems and abnormalities. When problems occur, they can be examined to locate and resolve the underlying reasons.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_DMARC_is_Important_for_Email_Security\"><\/span><strong>Why DMARC is Important for Email Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DMARC is critical for <a href=\"https:\/\/www.mailsafi.com\/what-is-email-security\">email security<\/a> for a few key reasons:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Prevents_spoofing_and_phishing\"><\/span> 1. <strong>Prevents spoofing and phishing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Receivers can use DMARC to determine with certainty whether an email purporting to be from a specific domain is real or a forgery. This stops attackers from convincingly using protected domains to send phishing emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Drives_adoption_of_authentication\"><\/span><strong>2. Drives adoption of authentication<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Senders are encouraged to implement SPF and DKIM by DMARC policies correctly. There would be less motivation to implement these safeguards if DMARC did not reject unauthenticated messages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Provides_visibility\"><\/span><strong>3. Provides visibility<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Unprecedented insight into domain-specific email spoofing is provided by DMARC reports. This makes it possible for security teams to monitor problems and improve defenses continuously.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Flexible_policy_controls\"><\/span>4. <strong>Flexible policy controls<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The diverse policy options provided by DMARC go beyond binary accept or reject. For instance, suspected fake mail could be quarantined or given extra analysis rather than being rejected outright.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Increased_user_trust\"><\/span>5. <strong>Increased user trust<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Customers are guaranteed the legitimacy of emails from protected domains by strict DMARC regulations. This increases user engagement and trust in verified brand communications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Industry_Momentum\"><\/span>6. <strong>Industry Momentum<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Major email providers and industry groups endorse and encourage DMARC adoption. Momentum continues to grow thanks to demonstrated success in fighting phishing and spoofing.<\/p>\n\n\n\n<p>With a combination of DMARC policies and <a href=\"https:\/\/www.mailsafi.com\/secure-email-gateway\">advanced security gateways<\/a>, organizations can shield users from phishing and fraudulent emails effectively.&nbsp;DMARC helps businesses to safeguard crucial communications, safeguard their brand, adhere to rules, and increase user confidence with the most thorough email authentication standard currently available.&nbsp;<\/p>\n\n\n\n<p>To <a href=\"https:\/\/mailsafi.com\/blog\/the-best-spam-filter-for-business\/\">successfully resist email spoofing and fraud<\/a>, companies should continuously review DMARC reports and gradually tighten regulations over time. Undoubtedly, threats will keep on changing, but careful DMARC adoption across industries can stop email communications from being used as a weapon against the public.&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_3556\" class=\"pvc_stats all  \" data-element-id=\"3556\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Email continues to be a crucial distribution channel for cyber threats and attacks like spear phishing. Impersonating well-known companies and sources in spoof emails is a growing trend. These can be used to spread malware, steal credentials, or carry out various types of online crimes and attacks. One of the most effective protocols available today [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3556\" class=\"pvc_stats all  \" data-element-id=\"3556\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":2,"featured_media":3559,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is DMARC and How Does it Work &#187; The MailSafi Blog<\/title>\n<meta name=\"description\" content=\"DMARC is an email validation system that verifies the authenticity of the sending domain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DMARC and How Does it Work &#187; The MailSafi Blog\" \/>\n<meta property=\"og:description\" content=\"DMARC is an email validation system that verifies the authenticity of the sending domain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-31T08:16:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-31T08:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"107\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zacharia Kimotho\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zacharia Kimotho\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\"},\"author\":{\"name\":\"Zacharia Kimotho\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/0c153202a6d3e554d8882d0470537bfe\"},\"headline\":\"What is DMARC and How Does it Work\",\"datePublished\":\"2023-08-31T08:16:15+00:00\",\"dateModified\":\"2023-08-31T08:27:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\"},\"wordCount\":1056,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png\",\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\",\"name\":\"What is DMARC and How Does it Work &#187; The MailSafi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png\",\"datePublished\":\"2023-08-31T08:16:15+00:00\",\"dateModified\":\"2023-08-31T08:27:54+00:00\",\"description\":\"DMARC is an email validation system that verifies the authenticity of the sending domain.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png\",\"width\":470,\"height\":107,\"caption\":\"What is DMARC and How Does it Work?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is DMARC and How Does it Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/0c153202a6d3e554d8882d0470537bfe\",\"name\":\"Zacharia Kimotho\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/632b62e956742744a010b8a20db354a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/632b62e956742744a010b8a20db354a2?s=96&d=mm&r=g\",\"caption\":\"Zacharia Kimotho\"},\"description\":\"Zacharia is a passionate SEO expert and content marketer who works at Kaluari Limited, a leading company in the field of Cloud and Email Hosting Solutions. He has been writing and sharing his insights on various topics related to AI, IT, and marketing for over five years. He loves to explore the latest trends and innovations in these domains and how they can benefit businesses and society. He also enjoys learning new skills and tools to enhance his online presence and reach.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/zacharia-kimotho\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DMARC and How Does it Work &#187; The MailSafi Blog","description":"DMARC is an email validation system that verifies the authenticity of the sending domain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"What is DMARC and How Does it Work &#187; The MailSafi Blog","og_description":"DMARC is an email validation system that verifies the authenticity of the sending domain.","og_url":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2023-08-31T08:16:15+00:00","article_modified_time":"2023-08-31T08:27:54+00:00","og_image":[{"width":470,"height":107,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png","type":"image\/png"}],"author":"Zacharia Kimotho","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"Zacharia Kimotho","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/"},"author":{"name":"Zacharia Kimotho","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/0c153202a6d3e554d8882d0470537bfe"},"headline":"What is DMARC and How Does it Work","datePublished":"2023-08-31T08:16:15+00:00","dateModified":"2023-08-31T08:27:54+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/"},"wordCount":1056,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png","articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/","url":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/","name":"What is DMARC and How Does it Work &#187; The MailSafi Blog","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png","datePublished":"2023-08-31T08:16:15+00:00","dateModified":"2023-08-31T08:27:54+00:00","description":"DMARC is an email validation system that verifies the authenticity of the sending domain.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2023\/08\/DMARC.png","width":470,"height":107,"caption":"What is DMARC and How Does it Work?"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is DMARC and How Does it Work"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/0c153202a6d3e554d8882d0470537bfe","name":"Zacharia Kimotho","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/632b62e956742744a010b8a20db354a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/632b62e956742744a010b8a20db354a2?s=96&d=mm&r=g","caption":"Zacharia Kimotho"},"description":"Zacharia is a passionate SEO expert and content marketer who works at Kaluari Limited, a leading company in the field of Cloud and Email Hosting Solutions. He has been writing and sharing his insights on various topics related to AI, IT, and marketing for over five years. He loves to explore the latest trends and innovations in these domains and how they can benefit businesses and society. He also enjoys learning new skills and tools to enhance his online presence and reach.","sameAs":["https:\/\/www.linkedin.com\/in\/zacharia-kimotho\/"]}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3556"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=3556"}],"version-history":[{"count":3,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3556\/revisions"}],"predecessor-version":[{"id":3561,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3556\/revisions\/3561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/3559"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=3556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=3556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=3556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}