What you'll learn in this article
- DMARC tags are parameters within a DMARC txt record that define authentication, reporting, and enforcement behavior.
- These tags determine how receiving mail servers respond to a DMARC failure and how domain activity is monitored.
- Core tags include v=, p=, rua=, ruf=, aDKIM=, aSPF=, fo, and the sp tag.
- Proper configuration supports DMARC authentication, improves domain visibility, and strengthens DMARC compliance.
- Tools such as a DMARC checker or DMARC record checker help validate configuration and identify errors.
What Are DMARC Tags
DMARC tags are the individual parameters that make up a DMARC txt record. Each tag defines a specific function within a DMARC implementation, such as policy enforcement, reporting configuration, or alignment requirements.
These tags work alongside an SPF record and DKIM record to validate message authenticity. They help receiving mail servers determine whether a message aligns with the organizational domain and whether a DMARC policy should be applied.
By defining authentication and reporting behavior, DMARC tags improve domain visibility and help enforce anti-spoofing controls.
The Role of DMARC Tags in Authentication
DMARC tags instruct receiving servers how to evaluate authentication results. They coordinate SPF and DKIM validation, confirm domain alignment, and determine how failures should be handled.
When properly configured, they reduce spoofing risk and ensure only authorized senders can use the domain for email.
Where DMARC Tags Are Found
DMARC tags are published within a DMARC txt record in DNS. This record is typically located at a host name such as:
_DMARC.example.com
Within the record, tags appear as key–value pairs separated by semicolons. Each pair defines a configuration parameter or policy instruction. A typical example of this may appear as:
v=DMARC1; p=quarantine; rua=mailto:reports@example.com; pct=100
This structure allows receiving mail servers to interpret DMARC authentication results and apply the appropriate DMARC policy when messages fail validation
DMARC Tag Types and What They Do
Organizations implementing DMARC should understand the function of each core tag and how it affects enforcement and reporting.
|
Tag |
Description |
|
Version (v) |
Required tag that defines the DMARC protocol version. The standard value is v=DMARC1. |
|
Policy (p) |
Required tag that sets the handling policy for emails that fail authentication. Options include none (monitor only), quarantine (send to spam), or reject (block delivery). |
|
RUA Report Email Address(es) (rua) |
Optional tag that specifies where aggregate DMARC reports are sent. These reports summarize authentication results across sending sources. Example: rua=mailto:reports@yourdomain.com. |
|
RUF Report Email Address(es) (ruf) |
Optional tag that designates where forensic or message-level failure reports are delivered. Example: ruf=mailto:forensics@yourdomain.com. |
|
Failure Reporting Options (fo) |
Optional tag that defines when forensic reports are generated, such as for SPF failure, DKIM failure, or both. |
|
ASPF Tag (aspf) |
Optional tag that sets the SPF alignment mode. Values include relaxed (r) or strict (s), depending on how closely domains must match. |
|
ADKIM Tag (adkim) |
Optional tag that defines DKIM alignment mode. Like aspf, it can be set to relaxed (r) or strict (s). |
|
Report Format (rf) |
Optional tag that specifies the format used for forensic reports, such as Authentication Failure Reporting Format (AFRF). |
|
Report Interval (ri) |
Optional tag that determines how often aggregate reports are sent, typically measured in seconds (for example, ri=86400 for daily reports). |
|
Subdomain Policy (sp) |
Optional tag that defines how DMARC policies apply to subdomains, allowing different enforcement levels from the primary domain. |
How DMARC Tags Influence Policy Enforcement
DMARC tags directly determine how receiving servers handle authentication outcomes and enforce policy decisions.
Policy Enforcement and Message Handling
The p= tag defines enforcement for the primary domain. Available values include none, quarantine, and reject. These settings determine whether failed messages are delivered, filtered, or blocked.
The sp tag applies enforcement to subdomains. This ensures that subdomain activity follows the same or a defined policy separate from the root domain.
The pct= tag enables phased enforcement by applying policy to a defined percentage of messages. This approach reduces disruption during DMARC setup and allows teams to identify legitimate sending sources.
Alignment and Authentication Strength
Alignment tags influence how strictly authentication checks are applied.
The aDKIM= tag determines DKIM alignment requirements for a valid DKIM signature. The aSPF= tag performs the same function for SPF alignment.
Stricter alignment reduces spoofing opportunities while maintaining legitimate mail flow when correctly configured.
Record Validation and Interpretation
The v= tag ensures the DMARC txt record is interpreted correctly by receiving servers. Without a valid version tag, policy instructions may not be applied, resulting in inconsistent enforcement.
How DMARC Tags Improve Email Visibility and Reporting
Reporting tags provide critical visibility into domain activity and authentication outcomes.
Aggregate Reporting and Domain Visibility
The rua= tag generates DMARC aggregate reports summarizing authentication results across sending sources. These reports help identify unauthorized senders, misconfigured systems, and shadow IT tools sending from the domain.
They also support remediation of configuration errors affecting authentic emails.
Forensic Reporting and Investigation
The ruf= tag delivers detailed reports for individual DMARC failure events. These reports support incident investigation and help security teams understand how spoofed messages attempt to bypass controls.
The FO tag defines when failure reports are generated, enabling organizations to monitor authentication failures more closely.
Strengthening Reporting with Advanced Analysis
Security teams use reporting insights to refine the DMARC policy, resolve SPF permerror issues related to excessive DNSlookups, and improve DMARC compliance.
Mimecast complements DMARC reporting with enhanced threat intelligence, anomaly detection, and adaptive blacklist monitoring. This provides deeper visibility into authentication failures and suspicious sending behavior.
Common Mistakes When Using DMARC Tags
Even small configuration errors can weaken a DMARC deployment and leave domains exposed to spoofing or delivery failures. Misconfigurations often occur during initial setup or when organizations move too quickly into enforcement without full visibility into their sending environment.
- Incomplete DMARC TXT record syntax – Missing or incorrect tags in the DMARC record can prevent proper policy enforcement or reporting, making it difficult to monitor authentication results.
- Missing reporting tags – Without configured reporting addresses, organizations lose visibility into authentication activity and cannot identify unauthorized senders or configuration issues.
- Incorrect SPF or DKIM alignment settings – If domains are not aligned correctly with the visible From address, legitimate emails may fail DMARC checks or spoofed messages may bypass controls.
- Misconfigured SPF records or DKIM signatures – Errors in SPF entries or DKIM signing can create authentication gaps that attackers exploit or cause valid email to be rejected.
- Enabling strict enforcement too early – Moving to quarantine or reject policies before monitoring traffic can block legitimate email and disrupt business communication.
Careful validation of DMARC records, alignment settings, and reporting configuration helps ensure authentication policies function as intended while maintaining reliable email delivery.
Recommended Best Practices for DMARC Tags
A structured approach to DMARC configuration helps organizations strengthen email authentication while minimizing disruptions to legitimate communication. Establishing visibility first, then moving toward enforcement in stages, allows teams to fine-tune policies and maintain consistent email delivery.
- Start with monitoring mode (p=none) – Begin by observing authentication results to identify legitimate senders and misconfigurations before enforcing stricter policies.
- Use a DMARC record generator – Automated generators help create properly formatted records and reduce the risk of syntax errors during setup.
- Validate configuration with a record checker – A DMARC record checker confirms that tags, alignment, and reporting settings are configured correctly.
- Centralize and review aggregate reports – Consolidating DMARC reports provides clearer visibility into sending activity, authentication failures, and potential spoofing attempts.
- Integrate reporting with advanced monitoring platforms – Connecting DMARC reporting with tools such as Mimecast enables continuous monitoring and faster response to authentication issues or emerging threats.
Conclusion
DMARC tags form the foundation of an effective DMARC authentication strategy. They define how messages are validated, how failures are handled, and how reporting data is generated.
Security teams evaluating or refining their DMARC setup should review tag configuration, validate reporting outputs, and implement enforcement in stages. Properly configured DMARC tags provide a reliable foundation for protecting organizational email environments.
Check your DMARC configuration and identify gaps before attackers do. Use Mimecast to validate your record, strengthen enforcement, and gain visibility across your domain ecosystem.