DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a DNS record that tells receiving mail servers what to do if an email fails authentication. While SPF and DKIM verify the sender, DMARC enforces the policy.
A typical DMARC record looks like this: v=DMARC1; p=reject; rua=mailto:admin@example.com
p=none: Just monitor and report; don't stop any emails (used for testing).p=quarantine: Send suspicious emails to the recipient's Spam folder.p=reject: Block failed emails entirely.ruf address. This helps you see exactly what the "spoofed" email looked like.Yes. SPF and DKIM are like ID cards, but DMARC is the bouncer. Without DMARC, a hacker can still spoof your domain, and the receiving server won't know whether to let the "fake" ID pass or block it.
Alignment happens when the domain in the "From" header matches the domain validated by SPF and/or DKIM. If they don't match, DMARC will fail.
Ensure you added the record to the hostname _dmarc.yourdomain.com. If you added it to the root domain (yourdomain.com), it won't be recognized by mail servers.
p=none is great for the first few weeks to see who is sending mail on your behalf. However, it provides zero protectionagainst spoofing. Your goal should always be to move to p=quarantine or p=reject.
This is very common. Because forensic reports (ruf) contain the actual headers and sometimes parts of the email body, many major mailbox providers (like Gmail and Outlook) have stopped sending them due to Privacy and GDPR concerns. They don't want to accidentally send PII (Personally Identifiable Information) to a third party. Today, ruf is mostly used by private enterprise mail servers rather than consumer ISPs.
Try UptimeObserver today. Setup in 2 minutes.