Setting a DMARC policy of p=reject offers the highest level of protection against email spoofing and is a key requirement for adopting BIMI. This policy instructs recipient servers to block messages that fail DMARC authentication. However, implementing p=reject should be the final stage of a careful, phased DMARC deployment, progressing from p=none to p=quarantine to gather data and test the impact. Thorough and continuous monitoring of DMARC reports is essential at each stage to identify all legitimate email sending sources, including third-party services, and ensure they are properly authenticated with SPF and DKIM to prevent valid emails from being inadvertently blocked.
16 marketer opinions
Building on a phased approach, implementing a DMARC p=reject policy is the ultimate goal for robust email security, significantly curbing spoofing and phishing attempts by blocking unauthenticated messages. This strong enforcement, while ideal for BIMI alignment and maximum protection, demands meticulous preparation. Senders must be highly confident in their outgoing mail streams, having spent several weeks or months extensively monitoring DMARC reports at p=none and p=quarantine. This crucial period allows for comprehensive identification and proper configuration of all legitimate sending sources, including third-party services like marketing platforms or transactional email providers. Only after ensuring every valid email stream is correctly authenticated and aligned should p=reject be deployed, thus preventing the unintended blocking of important legitimate mail. While a newly dedicated domain might accelerate this process, continuous vigilance through DMARC reporting remains essential to understand all mail flows and ensure successful delivery.
Marketer view
Marketer from Email Geeks explains the meanings of DMARC policies: 'none' for getting a handle on things, 'quarantine' for putting suspected mail in the spam folder, and 'reject' for outright blocking unauthenticated mail. He notes that 'reject' is suitable if you are very confident about your outgoing mail, but also warns that 'p=reject' can cause issues with mail redirection, particularly for discussion lists.
5 Oct 2022 - Email Geeks
Marketer view
Marketer from Email Geeks recommends sticking with p=none for several months to gather feedback reports before moving to a stricter policy. He warns that implementing p=reject on a new domain requires someone with deep DMARC knowledge and a full understanding of the email system to avoid critical failures or an 'apocolycatastrophuck'.
16 Mar 2023 - Email Geeks
4 expert opinions
While DMARC p=reject is a robust policy providing maximum protection against domain spoofing and is essential for displaying brand logos via BIMI, its implementation requires extreme caution. This policy directly instructs receiving servers to reject emails that fail DMARC authentication, making it unsuitable for organizations that have not meticulously prepared. The most significant risk lies in inadvertently blocking legitimate email streams that were previously unknown or improperly authenticated. Therefore, a deliberate, phased approach is paramount, beginning with p=none to gather comprehensive DMARC reports and identify all legitimate sending sources, followed by a transition to p=quarantine to test the policy's impact. Before reaching p=reject, every legitimate email source, including third-party senders, must be properly authenticated with SPF and DKIM and achieve DMARC alignment to avoid severe deliverability issues. It's also important to note that some ISPs may treat p=reject and p=quarantine policies similarly, by simply bulk-foldering mail rather than outright rejecting it.
Expert view
Expert from Email Geeks explains that the choice of a DMARC policy, such as p=reject, depends on what the sender hopes to achieve. She confirms that p=reject is required for BIMI. Laura warns that the biggest issue with going to p=reject is discovering previously unknown mailstreams that are not properly authenticated, which could lead to mail being rejected. She strongly advises reviewing DMARC reports to see what is currently failing before implementing any stricter policy. Laura also adds that, according to Valimail, at least one ISP treats p=reject and p=quarantine policies exactly the same, by bulk foldering the mail.
25 Feb 2025 - Email Geeks
Expert view
Expert from Spam Resource explains that DMARC p=reject, while a strong policy against spoofing, is not suitable for all organizations, especially those with complex email ecosystems involving many third-party senders. Rushing to this policy without thorough monitoring and ensuring all legitimate email sources are properly authenticated and aligned can lead to legitimate mail being blocked. It is crucial to use DMARC reports (starting with p=none) to identify and rectify authentication issues across all sending systems before considering p=reject.
30 Mar 2023 - Spam Resource
4 technical articles
The DMARC p=reject policy is the most robust measure for preventing email spoofing and phishing by instructing recipient mail servers to completely reject messages that fail DMARC checks. While offering the highest level of protection, this powerful policy must be implemented with extreme caution, serving as the final step in a gradual deployment. Organizations should meticulously transition from p=none to p=quarantine, dedicating ample time to monitor DMARC reports. This process ensures all legitimate email sources, including third-party services, are identified, properly configured with SPF and DKIM, and consistently achieve DMARC alignment. Only after verifying that no legitimate mail will be inadvertently blocked should p=reject be enabled.
Technical article
Documentation from Google Workspace Admin Help explains that p=reject is the strongest DMARC enforcement policy and should be enabled only after an organization is confident that all legitimate email sources are correctly configured for SPF and DKIM alignment, recommending a cautious transition from p=none and p=quarantine while monitoring DMARC reports.
7 Jun 2024 - Google Workspace Admin Help
Technical article
Documentation from Microsoft Learn shares that p=reject instructs recipient mail servers to completely reject messages failing DMARC checks, and this policy should be implemented gradually, moving from p=none to p=quarantine and finally to p=reject, only after extensive testing and analysis of DMARC reports ensure no legitimate email is inadvertently blocked.
22 Nov 2023 - Microsoft Learn
How should I configure DMARC for multiple domains and when should I implement a reject policy?
How to implement DMARC p=reject policy safely, especially when using ESPs like Mailchimp and GetResponse?
How to implement DMARC p=reject policy safely to avoid email deliverability issues?
What are the best practices for implementing a DMARC policy, and should you use reject or quarantine?
What DMARC settings should I use and what are the implications of using p=reject?
When should you use DMARC p=none, p=quarantine, or p=reject policies?