Safely implementing a DMARC `p=reject` policy, especially when using ESPs like Mailchimp and GetResponse, involves careful planning and a phased approach. A common recommendation is to begin with `p=none` to monitor email traffic, identify legitimate sources, and address any authentication issues. Subsequently, transition to `p=quarantine` before fully implementing `p=reject`. Due to ESPs often using their own Mail From domains, SPF alignment can be tricky, making DKIM alignment critical. Regular monitoring of DMARC reports is essential for identifying authentication failures. It is also important to look broader than Google PMT. Implementation should only occur after DKIM and SPF have passed on all legitimate emails. Consideration should be given to the point external factors can break DKIM signatures. And collaboration with ESPs to ensure SPF and DKIM alignment is vital. Also incremental adoption is a great way to test.
9 marketer opinions
Safely implementing a DMARC `p=reject` policy, especially with ESPs like Mailchimp and GetResponse, requires careful planning and monitoring. SPF alignment can be challenging with ESPs because they often use their own sending domains. A phased approach is recommended, starting with `p=none` to monitor traffic and identify legitimate sources, progressing to `p=quarantine`, and finally to `p=reject`. DMARC reporting tools are crucial for identifying authentication failures and misconfigurations. Working closely with ESPs to configure SPF and DKIM correctly is essential. Gradually increasing the `p=reject` percentage while monitoring reports provides a controlled rollout. Implementation should only occur after DKIM and SPF are passing for all legitimate emails.
Marketer view
Email marketer from Email Geeks shares they start with `p=quarantine` for 2-3 weeks before moving to `p=reject`.
26 Oct 2022 - Email Geeks
Marketer view
Email marketer from Email Geeks says if the mail is from Mailchimp, SPF will never align because Mailchimp uses their domain in the return path.
18 Aug 2021 - Email Geeks
8 expert opinions
Implementing DMARC `p=reject` safely, particularly when using ESPs like Mailchimp and GetResponse, requires a strategic and phased approach. Although DKIM alignment is often sufficient, SPF alignment issues with ESPs, due to their use of separate sending domains, necessitate careful attention. Starting with `p=none` to gather data and understand email streams is crucial, followed by a move to `p=quarantine` before fully implementing `p=reject`. DMARC reports are vital for monitoring and identifying authentication failures. As well as Google PMT, broader views of recipient providers is needed. External factors can unexpectedly break DKIM signatures in transit. A gradual implementation using `pct=` can mitigate risks. Thorough understanding of both internal and third-party email streams is necessary to prevent the rejection of legitimate emails.
Expert view
Expert from Word to the Wise, Laura Atkins, emphasizes starting with a 'p=none' policy to gather data. Then moving to 'p=quarantine' and eventually 'p=reject' once you are confident in your DMARC configuration.
13 Apr 2025 - Word to the Wise
Expert view
Expert from Email Geeks suspects the SPF alignment issue arises because the mail is sent through an ESP, which uses its own Mail From domain. For Mailchimp, SPF alignment isn't possible. For GetResponse, it might be possible, but requires contacting support.
23 Mar 2024 - Email Geeks
4 technical articles
Implementing DMARC `p=reject` safely requires careful planning and a phased approach. Documentation consistently emphasizes the importance of starting with a `p=none` policy to monitor email traffic, identify legitimate sending sources, and address authentication issues. Moving to `p=quarantine` before `p=reject` provides an additional layer of safety. Thorough testing, monitoring, and working closely with ESPs to ensure proper SPF and DKIM configuration are crucial to avoid unintended consequences, such as blocking legitimate emails. An incremental adoption through testing and monitoring is highly advised.
Technical article
Documentation from Google Workspace Admin Help explains the `p=reject` policy instructs recipient servers to reject emails that fail DMARC authentication. They emphasize the importance of thorough testing and monitoring before implementing this policy to avoid unintended consequences, such as blocking legitimate emails.
24 Dec 2022 - Google Workspace Admin Help
Technical article
Documentation from Microsoft details that DMARC `p=reject` is the strictest policy, advising it only be implemented after careful monitoring and testing. They also recommend working closely with ESPs to ensure proper SPF and DKIM configuration to avoid legitimate emails being blocked.
1 Apr 2025 - Microsoft Documentation
Can I set DMARC to reject if my domain doesn't send email?
Can I use DMARC with shared IP addresses?
Does DMARC guarantee emails will not be flagged as spam?
How can I implement a DMARC reject policy for non-existent domains to prevent spam?
How do I properly set up DMARC records and reporting for email authentication?
How should DMARC, SPF, and DKIM records be configured for domains that do not send email?