Implementing DMARC, particularly the 'p=reject' policy, requires a strategic and cautious approach. Documentation explains 'p=reject' instructs recipient servers to reject messages failing authentication, offering the strongest protection against spoofing. However, experts and marketers emphasize careful planning is paramount. The consistent recommendation is to begin with 'p=none' to monitor traffic, identify authentication issues, and ensure proper SPF and DKIM configuration across all sending sources (ESP, CRM, etc.) before moving to stricter policies. DMARC reporting (via rua/ruf tags) is vital for understanding the impact of your policy and identifying potential problems. It is also important to understand DMARC alignment. DMARC enhances deliverability by preventing spoofing and phishing, but maintaining good sending practices remains essential.
11 marketer opinions
The advice regarding DMARC settings, particularly the 'p=reject' policy, emphasizes a cautious, phased approach. Starting with 'p=none' is widely recommended to monitor email traffic and identify authentication issues without disrupting delivery. Ensuring proper SPF and DKIM configuration is crucial before implementing stricter policies like 'p=reject' to prevent legitimate emails from being blocked. DMARC reporting plays a vital role in understanding the impact of your policy and identifying potential problems. DMARC alignment is also important, with proper SPF and DKIM passing being required for messages to pass DMARC authentication. While DMARC improves deliverability by preventing spoofing, it doesn't guarantee it and good sending practices are still important.
Marketer view
Email marketer from Valimail shares that starting with 'p=none' is a recommended practice. This allows you to monitor DMARC reports and identify any legitimate email sources that are failing authentication before moving to a stricter policy like 'p=quarantine' or 'p=reject'.
27 Jul 2021 - Valimail
Marketer view
Email marketer from Spamhaus explains that while DMARC helps protect against direct spoofing, it doesn't automatically prevent you from being blocklisted for other spam-related issues. You still need to maintain good sending practices.
12 Sep 2023 - Spamhaus
5 expert opinions
The expert opinions on DMARC settings, especially regarding 'p=reject', highlight the importance of careful planning and monitoring. While 'p=reject' offers strong protection against spoofing, it demands thorough understanding of email streams and proper configuration of SPF and DKIM. Starting with 'p=none' for monitoring is generally recommended, along with appropriate reporting mechanisms. There's a consensus that using 'p=reject' without adequate preparation and ongoing monitoring can lead to significant deliverability issues and blocking legitimate emails.
Expert view
Expert from Word to the Wise shares the implication of using p=reject, noting it tells receivers to reject messages failing authentication. This requires ensuring your legitimate email is properly authenticated to prevent deliverability problems, highlighting the importance of monitoring and correctly configuring SPF and DKIM.
13 Jan 2022 - Word to the Wise
Expert view
Expert from Email Geeks shares a cautionary tale about a company (Crayola's parent company) that implemented 'p=reject' without proper support, guidance, or reporting, leading to deliverability issues.
17 Jun 2022 - Email Geeks
4 technical articles
The documentation consistently explains that the DMARC 'p' tag dictates how recipient mail servers handle messages failing authentication. Options include 'none' (no action), 'quarantine' (mark as spam), and 'reject' (block). 'p=reject' provides the strongest anti-spoofing protection by instructing servers to reject failing emails, but necessitates careful monitoring to avoid unintended blocking of legitimate mail. The RFC 7489 provides the official specification. DMARC records can include 'rua' and 'ruf' for reporting.
Technical article
Documentation from DMARC.org explains that using 'p=reject' instructs recipient mail servers to reject emails that fail DMARC authentication. This provides the strongest level of protection against spoofing but requires careful monitoring to avoid blocking legitimate email.
30 Mar 2025 - DMARC.org
Technical article
Documentation from RFC 7489, the official DMARC specification, formally defines the 'p' tag and its possible values ('none', 'quarantine', 'reject'), detailing the expected behavior of receiving mail servers for each policy option. This is the definitive source for understanding DMARC policy implementation.
28 Jun 2022 - RFC Editor
Are DMARC records required by Mailgun and Yahoo?
Are DMARC RUA and RUF tags mandatory for compliance and what are their benefits?
Can I set DMARC to reject if my domain doesn't send email?
Can I use DMARC with shared IP addresses?
Do Yahoo and Gmail require DMARC authentication for senders?
Does DMARC improve email deliverability and should ESPs push senders to set it up?