Home/Tools/Security/DMARC Generator

DMARC Generator

Generate DMARC DNS records with custom policies and reporting to protect your domain from email spoofing

100% Private - Runs Entirely in Your Browser
No data is sent to any server. All processing happens locally on your device.
Loading DMARC Generator...

Build your DMARC record step by step

Loading interactive tool...

Need Professional Security Testing?

Our penetration testers find vulnerabilities before attackers do. Get a comprehensive security assessment.

What Is DMARC

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that builds on SPF and DKIM to give domain owners control over how receiving mail servers handle unauthenticated messages. Published as a DNS TXT record at _dmarc.yourdomain.com, DMARC specifies a policy (none, quarantine, or reject) and enables aggregate and forensic reporting—giving organizations visibility into who is sending email using their domain.

DMARC addresses the fundamental gap left by SPF and DKIM alone: neither protocol tells receivers what to do when authentication fails. Without DMARC, a spoofed email that fails SPF might still be delivered to the recipient's inbox. DMARC closes this gap by explicitly instructing receivers to monitor, quarantine, or reject unauthenticated messages—making it the most critical email security protocol for preventing domain spoofing and phishing.

How DMARC Works

DMARC validates that at least one of SPF or DKIM passes AND aligns with the From: header domain:

Alignment check: DMARC requires that the domain in the From: header matches (or is a subdomain of) the domain that passed SPF or DKIM. This prevents attackers from passing SPF on their own domain while spoofing the From: address.

DMARC record syntax:

TagRequiredPurposeExample
vYesVersionv=DMARC1
pYesPolicy for domainp=reject
spNoPolicy for subdomainssp=quarantine
ruaNoAggregate report destinationrua=mailto:[email protected]
rufNoForensic report destinationruf=mailto:[email protected]
pctNoPercentage of messages to apply policypct=50
adkimNoDKIM alignment modeadkim=s (strict)
aspfNoSPF alignment modeaspf=r (relaxed)

Example DMARC record:

v=DMARC1; p=reject; sp=reject; rua=mailto:[email protected]; ruf=mailto:[email protected]; adkim=s; aspf=r; pct=100

DMARC policy progression:

  1. p=none — Monitor mode; collect reports without affecting delivery (start here)
  2. p=quarantine — Failed messages go to spam/junk folder
  3. p=reject — Failed messages are blocked entirely (target state)

Common Use Cases

  • Phishing prevention: Stop attackers from sending spoofed emails that appear to come from your domain
  • Brand protection: Ensure only authorized services send email using your organization's domain
  • Compliance: DMARC enforcement is required by NIST 800-177, FedRAMP, CMMC, and many industry standards
  • Deliverability improvement: Domains with DMARC p=reject have higher inbox placement rates at major providers
  • Visibility: DMARC aggregate reports reveal every IP address sending email using your domain

Best Practices

  1. Start with p=none and monitor — Deploy DMARC in monitor mode first to identify all legitimate email sources before enforcing
  2. Analyze aggregate reports weekly — RUA reports show which IPs are passing and failing authentication; use tools like DMARCian, Valimail, or Postmark to parse XML reports
  3. Progress to p=reject within 3-6 months — Remaining on p=none provides no protection; set a timeline for enforcement
  4. Apply the same policy to subdomains — Use sp=reject to prevent subdomain spoofing (attackers target unprotected subdomains)
  5. Require strict DKIM alignment — adkim=s ensures the DKIM signing domain exactly matches the From: domain, preventing subdomain-based bypass

References & Citations

  1. Internet Engineering Task Force (IETF). (2015). Domain-based Message Authentication, Reporting, and Conformance (DMARC) - RFC 7489. Retrieved from https://datatracker.ietf.org/doc/html/rfc7489 (accessed January 2025)
  2. DMARC.org. (2024). DMARC Overview. Retrieved from https://dmarc.org/overview/ (accessed January 2025)
  3. Google. (2024). Email sender guidelines. Retrieved from https://support.google.com/mail/answer/81126 (accessed January 2025)

Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.

Frequently Asked Questions

Common questions about the DMARC Generator

DMARC (Domain-based Message Authentication, Reporting and Conformance) DNS TXT record defines how to handle emails failing SPF/DKIM authentication. Format: _dmarc.example.com TXT "v=DMARC1; p=none; rua=mailto:[email protected]". Tags: p (policy), rua (aggregate reports), ruf (forensic reports), pct (percentage), adkim/aspf (alignment). Protects against spoofing, provides visibility into email authentication failures.

0