After updating to a DMARC policy of `p=reject` with Symantec Email Security Cloud, email alignment failures are multifactorial. Issues can arise from Symantec's processing of emails, like URL rewriting for anti-phishing, which breaks DKIM signatures. Tenant-level configurations, errors in SPF/DKIM records, DNS propagation delays, and mismatches between the DKIM signing domain and the 'From:' header also contribute. Furthermore, email forwarding and the strict nature of the `p=reject` policy, potentially causing false positives, play a role. DMARC relies on the correct interaction of SPF and DKIM; any failure in either will lead to a DMARC failure.
6 marketer opinions
Emails failing DMARC alignment with Symantec Email Security Cloud after updating to a `p=reject` policy can stem from several causes. These include potential tenant-level configurations within Symantec, anti-phishing technologies rewriting URLs, incorrect SPF or DKIM records, DNS propagation delays after updating DMARC records, or DKIM signing domain mismatches.
Marketer view
Email marketer from EmailGeek Community suggests the issue might stem from a tenant-level configuration within Symantec Email Security.cloud, particularly affecting how it handles DMARC alignment checks. This could be due to specific settings or rules applied at the tenant level that are not correctly processing the updated DMARC policy.
11 Feb 2022 - EmailGeek Community
Marketer view
Marketer from Email Geeks advises the sender to have a friendly recipient escalate the issue through Symantec's support chain, as it might be a bug or systems integration issue.
7 May 2022 - Email Geeks
4 expert opinions
Emails failing DMARC alignment with Symantec Email Security Cloud after updating to a `p=reject` policy can be attributed to several factors. Anti-phishing technologies rewriting URLs and breaking DKIM, email forwarding practices interfering with authentication, and the strictness of the `p=reject` policy leading to false positives when sender alignment isn't perfect are all potential causes. Understanding the implications of each DMARC policy is critical.
Expert view
Expert from Word to the Wise explains that setting a DMARC policy to `p=reject` without fully understanding the implications can lead to false positives. Symantec's actions might trigger rejections if the sender's authentication isn't perfectly aligned, and it's crucial to monitor DMARC reports to identify and rectify these issues.
28 Apr 2022 - Word to the Wise
Expert view
Expert from Email Geeks explains why a `p=quarantine` policy results in delivery (with potential spam folder placement), while `p=reject` causes bounces.
13 Jan 2022 - Email Geeks
5 technical articles
Emails failing DMARC alignment with Symantec Email Security Cloud after a `p=reject` policy update are often due to Symantec's email processing (e.g., URL rewriting) interfering with DKIM signatures, or fundamental SPF/DKIM misconfigurations. The `p=reject` policy enforces strict DMARC compliance, causing rejections when alignment fails, even slightly. DMARC's reliance on proper SPF and DKIM interaction means any failure in either mechanism results in DMARC failure and policy enforcement.
Technical article
Documentation from DMARC.org highlights that a `p=reject` policy instructs receiving mail servers to reject emails that fail DMARC checks. If the emails are genuinely failing alignment, this setting will cause bounces. Incorrect configurations or issues with email authentication (SPF/DKIM) are primary causes.
4 Mar 2023 - DMARC.org
Technical article
Documentation from Microsoft support explains the importance of checking SPF and DKIM alignment modes. If the alignment is set to 'strict' but is failing even slightly, it will lead to a DMARC failure and a reject action based on the policy.
25 Dec 2024 - Microsoft
How can I troubleshoot DMARC failures and identify the cause of authentication issues?
How do I properly set up DMARC records and reporting for email authentication?
How important is DMARC for email and spam protection, and when should it be enabled?
How should I configure DMARC for multiple domains and when should I implement a reject policy?
How to deal with a failing DMARC email authentication protocol?
What DMARC settings should I use and what are the implications of using p=reject?