Rolling out DMARC enforcement effectively involves a phased approach that prioritizes proper DKIM and SPF setup before implementing more stringent DMARC policies. It's crucial to start with a 'p=none' policy to gather data, identify legitimate sending sources, and address any DKIM or SPF configuration issues. Understanding that forwarding breaks SPF/DKIM alignment, consider implementing ARC (Authenticated Received Chain) or SPF flattening to mitigate these issues. Monitor DMARC reports regularly to address configuration errors and ensure compliance, and gradually move to 'p=quarantine' and then 'p=reject' based on insights from the reports. Special attention should be given to DKIM signing for Google Workspace and third-party senders and utilizing tools like MXToolbox to check for record errors.
15 marketer opinions
Rolling out DMARC enforcement requires a phased approach, starting with a monitoring policy (p=none) to gather data and identify legitimate email sources. Prioritize resolving DKIM issues by ensuring proper DKIM signing, particularly for Google Workspace and third-party senders. Implement ARC (Authenticated Received Chain) to mitigate forwarding-related DMARC failures. Use DMARC reporting tools to identify and correct configuration errors before gradually enforcing stricter policies (quarantine then reject).
Marketer view
Email marketer from Proofpoint advises that when dealing with DMARC enforcement, you must properly authenticate third-party senders, i.e., include them in your SPF record or have them sign with DKIM using your domain. They suggest working closely with these vendors to ensure they comply with DMARC requirements.
13 Mar 2024 - Proofpoint
Marketer view
Marketer from Email Geeks suggests that Google Calendar invites should not cause DMARC issues if Google Workspace DKIM is correctly implemented. SPF alignment may break because Google overwrites the Return-Path.
10 Oct 2021 - Email Geeks
2 expert opinions
Implementing DMARC should start with ensuring proper SPF and DKIM records are in place. Forwarding can cause DMARC failures due to SPF and DKIM mismatches. A staged deployment is recommended, beginning with a monitoring policy ('p=none') to assess impact and identify legitimate sending sources. Implementing ARC (Authenticated Received Chain) can help build trust and manage brand visibility.
Expert view
Expert from Spam Resource explains the importance of proper SPF and DKIM setup prior to implementing a DMARC policy and suggests deploying DMARC in stages, starting with a monitoring policy (p=none) to assess the impact and identify legitimate sending sources before moving to quarantine or reject policies.
24 Sep 2022 - Spam Resource
Expert view
Expert from Word to the Wise explains that DMARC failures occur with forwarding because the original SPF and DKIM records don't match. She suggests implementing ARC (Authenticated Received Chain) and BIMI to build trust and manage brand visibility. Also, start with 'p=none' to gather data before enforcing stricter policies.
25 Mar 2025 - Word to the Wise
4 technical articles
Rolling out DMARC enforcement involves setting up SPF and DKIM records, monitoring DMARC reports to identify legitimate email sources, and gradually increasing the DMARC policy from 'p=none' to 'p=quarantine' and then to 'p=reject'. To handle forwarding, use the Authentication-Results header and ARC (Authenticated Received Chain), which allows receiving servers to validate the authentication status of forwarded messages. Proper DKIM configuration is crucial, which includes generating DKIM keys, adding CNAME records to DNS settings, and enabling DKIM signing.
Technical article
Documentation from Microsoft explains how to configure DKIM for your custom domain in Microsoft 365. This involves generating DKIM keys, adding CNAME records to your DNS settings, and enabling DKIM signing for your domain. Proper DKIM implementation ensures that your emails are authenticated and pass DMARC checks.
26 Sep 2024 - Microsoft
Technical article
Documentation from DMARC.org suggests using the Authentication-Results header and ARC (Authenticated Received Chain) to handle forwarded emails. These mechanisms allow receiving servers to validate the authentication status of forwarded messages, mitigating DMARC failures due to forwarding.
27 Sep 2022 - DMARC.org
Can DMARC reports be sent without RUA or RUF addresses?
How can DMARC reports be enriched with user-level data for better domain enforcement?
How can I implement a strict DMARC policy without blocking Google Workspace emails?
How do DMARC policies and RUA/RUF settings inherit or override each other between a domain and its subdomains?
How do email forwarding and DMARC policies affect email delivery and reporting?
How do Google Groups impact DMARC when forwarding emails from multiple domains?