When DMARC 'reject' is set but not enforced on inbound servers, spoofed emails can still bypass security measures. The core issue is that DMARC's effectiveness hinges on the recipient mail server actively checking and enforcing the DMARC policy. Setting up DMARC is only the first step; if the inbound server doesn't respect the policy, spoofed emails can land in inboxes. Experts, marketers, and documentation uniformly suggest that continuous monitoring of DMARC reports is vital to understand how receivers treat DMARC policies, and that implementing DMARC checking on the inbound server is crucial. Furthermore, contacting ISPs and providers to push for DMARC adoption and enforcement is essential. Achieving DMARC compliance isn't a one-time event but an ongoing process requiring monitoring and adjustments. Major email platforms offer configurations for checking DMARC compliance on inbound mail.
9 marketer opinions
DMARC's effectiveness in preventing email spoofing hinges on the recipient mail server's enforcement of the DMARC policy. While setting a DMARC record to 'reject' instructs receiving servers on how to handle authentication failures, many servers do not consistently enforce this policy. This can lead to spoofed emails bypassing intended protections. Experts and marketers suggest strategies like monitoring DMARC reports, contacting non-enforcing providers, implementing stronger email security solutions, and ensuring proper SPF and DKIM setup to mitigate the risks.
Marketer view
Email marketer from Proofpoint shares that DMARC enforcement on the receiving end is crucial. A DMARC record only instructs receiving mail servers on how to handle mail failing authentication checks. If the inbound server ignores the DMARC policy, spoofing can still occur. Consider using email security solutions that enforce DMARC for inbound emails.
26 Nov 2022 - Proofpoint
Marketer view
Email marketer from Reddit mentions that it is a common misconception that setting DMARC is enough. Setting up the record in DNS is not enough - you have to also ensure that the receiving end actually performs the checks. Without that you will still have spoofing.
24 Aug 2024 - Reddit
5 expert opinions
When DMARC 'reject' is set but not enforced on inbound servers, spoofed emails can still reach inboxes. This is because DMARC policies are requests, not requirements, and their effectiveness hinges on recipient mail server enforcement. Experts recommend implementing DMARC checking on your inbound server, continuously monitoring DMARC reports to track policy adherence, and contacting ISPs or providers to advocate for DMARC adoption. Achieving DMARC compliance is an ongoing process requiring monitoring and adjustment.
Expert view
Expert from Word to the Wise explains that proper monitoring of DMARC reports is vital to understanding how recipients are treating your DMARC policies. If you are not receiving or analyzing these reports, you will not know if your policy is being followed or if spoofing attempts are occurring. Use DMARC monitoring tools to help read and interpret DMARC aggregate reports.
16 Nov 2022 - Word to the Wise
Expert view
Expert from Email Geeks explains the client is not enforcing DMARC on the inbound mail server for their domain, meaning the incoming mailserver for nesformation.fr is not checking for DMARC. To fix this, implement DMARC checking, likely through cpanel or a similar interface at OVH.
30 Apr 2022 - Email Geeks
5 technical articles
When DMARC is set to 'reject' but not enforced on the inbound mail server, spoofed emails can bypass security measures. Documentation highlights that DMARC relies on receiving mail servers to actively check and enforce DMARC policies. Without this enforcement, DMARC is ineffective, and spoofing can occur. Platforms like Google Workspace and Microsoft 365 can be configured to check for DMARC compliance. Key to successful implementation is ensuring receivers are configured correctly and provide feedback reports.
Technical article
Documentation from Cloudflare advises that DMARC is effective in protecting domains from email spoofing. However it relies on the destination email provider to actually check and respect the DMARC record settings. In the event that a destination server does not respect or check a DMARC record, there will be no protection against spoofing.
3 Jan 2023 - Cloudflare
Technical article
Documentation from RFC details DMARC, what it does, and it also highlights that receivers need to be configured correctly in order to respect the policies set by the owner of the domain. The receivers should also provide feedback in the form of reports to the senders so that they can improve.
11 Feb 2023 - RFC
How can a phishing email pass SPF and DKIM authentication checks?
How can I implement a DMARC reject policy for non-existent domains to prevent spam?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can I protect my domain from being spoofed and blacklisted?
How can I use DMARC to prevent spammers from using my domain?
How can spammers send emails from real addresses, and is this a DMARC configuration issue?
How do DMARC quarantine and reject policies affect sender reputation and email delivery?
How should I configure DMARC for multiple domains and when should I implement a reject policy?