Quick Start Templates
Start with a preset template based on your experience level and requirements. You can customize any template after selection.
Monitoring
BeginnerFor organizations just starting with DMARC
Features:
- ✓No email filtering
- ✓Aggregate reports only
- ✓Safe for immediate deployment
- ✓Learn about your email sources
Quarantine
IntermediateFor organizations with established SPF/DKIM
Features:
- ✓Mark unauthenticated email as spam
- ✓Aggregate and forensic reports
- ✓Subdomain protection
- ✓Relaxed alignment
Strict Rejection
AdvancedFor maximum brand protection
Features:
- ✓Block all unauthenticated email
- ✓Strict alignment mode
- ✓Subdomain rejection policy
- ✓Comprehensive reporting
Gradual Rollout
IntermediateFor careful enforcement testing
Features:
- ✓10% enforcement rate
- ✓Test before full deployment
- ✓Minimize disruption risk
- ✓Easy to adjust percentage
💡 Recommendation: Start with the Monitoring template if you're new to DMARC. It's safe to deploy immediately and won't affect email delivery while you learn about your email sources.
Or start from scratch with the wizard:
Need Help with Email Security?
Our security team can help you implement DMARC, SPF, DKIM, and protect your domain from email spoofing and phishing attacks.
Understanding DMARC Implementation
DMARC is the final layer of email authentication that protects your domain from being used in phishing attacks.
DMARC Policies
- • none: Monitor mode - collect reports only
- • quarantine: Send suspicious emails to spam
- • reject: Block unauthenticated emails entirely
- • Start with "none" and gradually increase strictness
- • Use subdomain policy (sp) for different policies
Implementation Steps
- 1. Set up SPF record for your domain
- 2. Configure DKIM signing for outbound mail
- 3. Add DMARC record with p=none for monitoring
- 4. Review aggregate reports for 1-2 weeks
- 5. Gradually increase to quarantine, then reject
Frequently Asked Questions
Common questions about the DMARC Generator
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that helps prevent email spoofing and phishing. It builds on SPF and DKIM to give domain owners control over how receivers should handle unauthenticated emails from their domain.
Explore More Tools
Continue with these related tools
Password Strength Checker
Test your password strength and get recommendations for improvement
Password Generator
Generate secure random passwords with customizable options
CVE Vulnerability Search & Timeline
Search CVEs, visualize vendor trends, analyze response times, and calculate CVSS scores
CWE Lookup Tool
Look up Common Weakness Enumeration entries from MITRE with detailed mitigations and Top 25 list
SystemLens
Desktop app for filesystem analysis and security auditing with SSH scanning (macOS, Windows, Linux)
Hash Generator
Generate cryptographic hashes (MD5, SHA-256, SHA-512) for files and text. Check malware with VirusTotal integration.
⚠️ Security Notice
This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.