When deploying DMARC, the choice of policy-p=none, p=quarantine, or p=reject-depends on your current stage of implementation and your confidence in your email authentication. Starting with p=none is universally recommended for initial monitoring, allowing organizations to collect DMARC reports and understand their email ecosystem without impacting delivery. This discovery phase is crucial for identifying all legitimate sending sources and any authentication gaps.
11 marketer opinions
Building upon this initial understanding, the phased implementation of DMARC policies allows for increasing levels of enforcement against unauthenticated email. P=none provides essential visibility and data collection without any enforcement, serving as the critical discovery phase to identify all legitimate sending sources and pinpoint authentication gaps. Once confident in the identified sending sources and after addressing any authentication issues, the recommended progression is to p=quarantine. This policy offers controlled mitigation, directing emails that fail DMARC authentication to spam or junk folders, acting as a valuable testing ground to ensure legitimate mail flows are unaffected. Finally, p=reject represents the strongest policy, outright blocking unauthenticated emails, providing the highest level of protection against spoofing and phishing. This ultimate enforcement should only be deployed after meticulous monitoring and thorough validation confirm that all legitimate emails consistently pass DMARC authentication checks.
Marketer view
Marketer from Email Geeks explains the nuances of DMARC deployment and policy selection. He notes that while not having DMARC can lead to reputation damage for phishing targets, deploying DMARC, especially with p=quarantine or p=reject policies, can be expensive, painful to maintain, and may marginally reduce deliverability. He clarifies that aiming for DMARC-aligned DKIM and SPF authentication is a good goal, and using DMARC p=none is a good tool for that. He advises that if you are paying a service to analyze DMARC feedback reports and are committed to fixing authentication failures, then setting p=none with feedback on everything is beneficial. However, if there's no intent to fix authentication issues, he suggests not publishing DMARC at all, as feedback reports become a
12 Sep 2024 - Email Geeks
Marketer view
Email marketer from Fortra explains that p=none provides crucial visibility into email authentication without taking any enforcement action, making it ideal for the discovery phase. P=quarantine offers controlled mitigation by directing failing emails to spam or junk folders, while p=reject provides full enforcement, blocking unauthenticated emails outright, stressing the importance of a phased approach.
20 Feb 2025 - Fortra
2 expert opinions
To effectively manage DMARC policies, a strategic approach involves progressing through p=none, p=quarantine, and p=reject based on your confidence in authentication. P=none serves as the crucial starting point for data collection and monitoring, allowing you to understand your email traffic without any deliverability impact. Once confident that legitimate email streams are properly authenticated and pass DMARC checks, p=quarantine offers a measured step, directing unauthenticated messages to spam folders. The strongest policy, p=reject, which completely blocks non-compliant emails, should only be implemented when there's absolute certainty that all valid email from your domain is consistently authenticated and will pass DMARC, ensuring no legitimate mail is inadvertently blocked.
Expert view
Expert from Spam Resource explains that DMARC p=none should be used for initial monitoring to gather data without impacting delivery. P=quarantine is the next step, directing failed emails to spam folders, suitable after confirming legitimate mail passes DMARC. P=reject is the strongest policy, blocking failed emails, and should only be deployed when very confident all legitimate mail is correctly authenticated and passes DMARC, to prevent unauthorized domain use.
1 Aug 2024 - Spam Resource
Expert view
Expert from Word to the Wise shares that DMARC p=none is the recommended starting point to collect data and understand email streams without affecting deliverability. P=quarantine can be implemented once the sender is comfortable with the data, moving failed messages to spam. The strongest policy, p=reject, should only be used when a sender is completely confident that all legitimate email from their domain is correctly authenticated and will pass DMARC.
20 Feb 2022 - Word to the Wise
4 technical articles
The strategic application of DMARC policies-p=none, p=quarantine, and p=reject-is fundamental for robust email security. Begin with p=none to initiate essential monitoring and data collection, which is vital for understanding email traffic without any immediate impact on deliverability. Progress to p=quarantine, a measured step that directs unauthenticated emails to spam or junk folders, providing a controlled environment for testing DMARC's enforcement. The final stage, p=reject, offers the strongest defense by outright blocking unauthorized messages, but this policy should only be implemented once exhaustive analysis confirms that all legitimate mail streams are consistently authenticated and pass DMARC checks, preventing unintended blocking of valid communications.
Technical article
Documentation from M3AAWG explains that DMARC p=none should be used for initial monitoring and data collection, p=quarantine for a gradual rollout to manage suspicious emails by sending them to spam folders, and p=reject for full enforcement to block unauthorized emails only after thorough analysis and ensuring legitimate mail passes authentication.
5 Mar 2024 - M3AAWG
Technical article
Documentation from Google Workspace Admin Help advises starting with p=none to gather DMARC reports without affecting mail delivery. Once comfortable with the data, transition to p=quarantine for a soft rejection, where unauthenticated emails are sent to spam. Finally, apply p=reject for complete blocking of unauthenticated messages after verifying that all legitimate sending sources are correctly authenticated.
16 Jul 2022 - Google Workspace Admin Help
Does implementing DMARC improve email deliverability and is DMARC p=none policy useful?
How should I configure DMARC for multiple domains and when should I implement a reject policy?
How should I enforce DMARC policies for a bulk sender with p=none?
What are the best practices for implementing a DMARC policy, and should you use reject or quarantine?
What DMARC settings should I use and what are the implications of using p=reject?
When and why should I switch from DMARC p=none to p=quarantine or p=reject?