{"id":7076,"date":"2023-06-01T14:40:00","date_gmt":"2023-06-01T14:40:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/01\/12\/what-is-dmarc-and-how-does-it-improve-email-security\/"},"modified":"2023-06-27T17:06:09","modified_gmt":"2023-06-27T17:06:09","slug":"what-is-dmarc","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/","title":{"rendered":"What Is DMARC Email Security Technology?"},"content":{"rendered":"\n<p>The Domain-based Message Authentication, Reporting and Conformance (DMARC) standard for email authentication is adopted by all U.S. email domain providers and many corporate and government entities. DMARC addresses weaknesses in other email authentication standards to check for misleading \u201cFrom\u201d fields in emails and to improve tracking of potential spoofing campaigns. The standard enables email security solutions and internet service providers (ISPs) to filter in \u201cgood\u201d emails and improve their ability to filter out \u201cbad\u201d emails.<\/p>\n\n\n\n<p>To understand the DMARC standard in more detail this article will cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#overview\">What Is DMARC<\/a><\/li>\n\n\n\n<li><a href=\"#mechanics\">How Does DMARC Work<\/a><\/li>\n\n\n\n<li><a href=\"#implementation\">DMARC Implementation<\/a><\/li>\n\n\n\n<li><a href=\"#pros\">DMARC Advantages<\/a><\/li>\n\n\n\n<li><a href=\"#cons\">DMARC Disadvantages<\/a><\/li>\n\n\n\n<li><a href=\"#faqs\">DMARC FAQ<\/a><\/li>\n\n\n\n<li><a href=\"#bottom-line\">Bottom Line: Mature Organizations Should Pursue DMARC Email Authentication<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"overview\">What Is DMARC?<\/h2>\n\n\n\n<p>Domain-based Message Authentication, Reporting and Conformance is a protocol that was first <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/fifteen-companies-announce-e-mail-security-standard.html\">proposed<\/a> in January 2012 and widely adopted in 2018 by the U.S. government as part of the Department of Homeland Security (DHS) 18-01 binding operational directive. DMARC builds upon the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\">Sender Policy Framework<\/a> (SPF) and the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">DomainKeys Identified Message<\/a> (DKIM) technologies to add security and instructions for a specific domain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mechanics\">How Does DMARC Work?<\/h2>\n\n\n\n<p>A DMARC policy is included in a DNS record for a given domain, enabling the sender to specify if messages are protected by SPF or DKIM. Additionally, the DMARC authentication enables DMARC Alignment that checks between the \u201cFrom\u201d fields displayed in the email and the from field in the header. This counters a common spoofing technique where the attacker changes the \u201cFrom\u201d field displayed in the header to impersonate a trustworthy sender.<\/p>\n\n\n\n<p>DMARC also provides instructions regarding how messages should be handled if the message fails one or more authentication checks. For messages that fail DMARC, DMARC records also include email addresses to receive compliance and forensic reports for DMARC-failing emails.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"794\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/06\/eSP-DMARC-1024x794.png\" alt=\"eSP: How DMARC Checks Work\" class=\"wp-image-30858\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-1024x794.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-300x232.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-768x595.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-1536x1190.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-2048x1587.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-150x116.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-696x539.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-1068x828.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-DMARC-1920x1488.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How DMARC Checks Work<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Record<\/h3>\n\n\n\n<p>The DMARC record publishes to an organization\u2019s DNS record so it is publicly available for email servers to check. As an example, Microsoft\u2019s <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/use-dmarc-to-validate-email?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">DMARC.TXT file reads<\/a> as:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>_dmarc.microsoft.com. 3600 IN TXT \"v=DMARC1; p=none; pct=100; rua=mailto:d@rua.contoso.com;\nruf=mailto:d@ruf.contoso.com; fo=1\"&nbsp;<\/code><\/pre>\n\n\n\n<p>For a complete list of variables and options for the DMARC record, see the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-and-implement-dmarc-email-security\">DMARC Setup Guide: How to Implement a Basic DMARC Setup<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Alignment<\/h3>\n\n\n\n<p>A key element of the DMARC check is Alignment, in which the domain in the message&#8217;s \u201cFrom:\u201d field is compared against other authenticated domain names from the SPF and DKIM checks. If either SPF or DKIM alignment checks pass, then the DMARC alignment test passes.<\/p>\n\n\n\n<p>DMARC provides for either strict or relaxed alignment checks. With strict alignment the domain names must be identical. Using relaxed alignment allows the top-level &#8220;Organizational Domain&#8221; to fulfill the match requirement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Check Process<\/h3>\n\n\n\n<p>Upon receiving an email, the receiving email server can perform a DNS lookup to check for DMARC, DKIM, and SPF records. The receiving email server can then examine the DMARC file for instructions for how to handle the email if the email fails DKIM or SPF checks. Failing emails may be flagged to be rejected (p=reject), quarantined to a spam folder (p=quarantine), or to be allowed to be delivered to a recipient anyway (p=none). Note that some email services, such as Microsoft 365, may treat both reject and quarantine the same and forward the emails to the spam folder.<\/p>\n\n\n\n<p>Messages that pass DMARC will be delivered to the recipient. Messages that fail DMARC can be discarded, quarantined as SPAM, or allowed to be delivered anyway depending upon the DMARC record instructions. The server will then generate DMARC reports regarding emails that fail the DMARC check and send them to the emails in the DMARC record instructions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Reports<\/h3>\n\n\n\n<p>The DMARC standard provides for two types of reports: aggregate reports and forensic reports. Both types of reports provide machine-readable formats that can be difficult to read and analyze without the aid of additional third-party DMARC reporting tools. Additionally, these reports may be sent as .zip attachments, so organizations must ensure their email address in the DMARC record can accept .zip attachments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aggregate DMARC Reports<\/h4>\n\n\n\n<p>Aggregate reports provide statistical data to an organization about email messages that claim to be from their email domain. These XML format reports include authentication results (pass\/no pass) and how the message was handled. Organizations use these reports to check delivery rates, identify internal senders that may not be properly configured, and identify potential spoofing campaigns attempting to impersonate the organization.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Forensic DMARC Reports<\/h4>\n\n\n\n<p>Forensic reports provide copies of email messages that fail DMARC authentication. An organization can analyze these emails to troubleshoot an organization\u2019s domain authentication issues or to identify malicious websites and domains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"implementation\">DMARC Implementation<\/h2>\n\n\n\n<p>DMARC can be activated by the addition of an appropriately formatted text file with the DNS record of an organization. However, effective implementation requires the prior establishment of SPF and DKIM email authentication, careful attention to detail, and patience in troubleshooting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Dependencies: SPF, DKIM<\/h3>\n\n\n\n<p>DMARC assumes the prior establishment of the DKIM and SPF email authentication standards. DMARC will check against these standards for alignment and authentication.<\/p>\n\n\n\n<p><strong>DKIM:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">DomainKeys Identified Mail<\/a> (DKIM) enables an organization to digitally sign emails from their domain using public key cryptography.<\/p>\n\n\n\n<p><strong>SPF:<\/strong> The <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\">Sender Policy Framework<\/a> (SPF) authentication method designates the authorized mail servers that send email from an organization\u2019s domain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Basic DMARC Setup<\/h3>\n\n\n\n<p>The basic steps of DMARC setup include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Publish a DMARC record with the DNS provider<\/li>\n\n\n\n<li>Monitor DMARC reports to capture legitimate senders that fail DMARC<\/li>\n\n\n\n<li>Modify SPF, DKIM, and DMARC as necessary to ensure legitimate source pass<\/li>\n\n\n\n<li>Tighten DMARC restrictions<\/li>\n\n\n\n<li>Monitor DMARC reports for legitimate sources that fail and for potentially malicious sources attempting to impersonate the organization<\/li>\n<\/ol>\n\n\n\n<p>However, each step can become quite involved and require attention to detail. For more detailed information on each step, please read the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-and-implement-dmarc-email-security\">DMARC Setup Guide: How to Implement a Basic DMARC Setup<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Troubleshoot DMARC<\/h3>\n\n\n\n<p>Although DMARC can fail for many reasons, organizations of all sizes can resolve DMARC issues with reasonable effort and attention to detail.<\/p>\n\n\n\n<p>\u201cDMARC requires many intricate steps,\u201d explains Seth Blank, CTO of Valimail and co-chair of the DMARC Working Group. \u201cEven small mistakes could result in a number of issues such as accidentally filtering legitimate emails. The risks associated with reaching enforcement may be one reason why just 43.4% of enterprise DMARC policies are at enforcement.\u201d<\/p>\n\n\n\n<p>For more detailed information on troubleshooting, see our article <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/getting-dmarc-right\/\">Why DMARC is Failing: 3 Critical Issues With DMARC Deployment<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Service Providers<\/h3>\n\n\n\n<p>Many organizations do not want to take the time to dive into the details of SPF, DKIM, and DMARC to resolve issues. Fortunately, a quick Google search will reveal that many different service providers provide services to establish, maintain, and monitor SPF, DKIM, and DMARC.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pros\">DMARC Advantages<\/h2>\n\n\n\n<p>Many organizations see value in tightening email security by implementing DMARC. DMARC policies <a href=\"https:\/\/dmarc.org\/2021\/02\/dmarc-policies-increase-43-over-2020\/\" target=\"_blank\" rel=\"noreferrer noopener\">increased by 43%<\/a> in 2020 and grew <a href=\"https:\/\/dmarc.org\/2022\/03\/dmarc-policies-up-84-for-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">a further 84%<\/a> in 2021 to reach nearly 5 million valid DMARC records confirmed by DNS.<\/p>\n\n\n\n<p>Organizations choose to implement DMARC because of the many advantages it can provide, such as enabling brand indicators, email troubleshooting, the flagging of malicious content, the reduction of impersonation by attackers, improved email reporting, and improved domain reputation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Brand Indicators for Message Identification (BIMI)<\/h3>\n\n\n\n<p>Organizations that deploy DMARC can implement <a href=\"https:\/\/bimigroup.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brand Indicators for Message Identification<\/a> (BIMI) that enable a brand\u2019s logo to be displayed for authenticated emails. Large email providers such as Yahoo! or Gmail support this standard that can improve brand recognition, trust, and engagement for email recipients.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Troubleshooting<\/h3>\n\n\n\n<p>An organization often receives no feedback to know that an email campaign has been flagged as spam. Implementing DMARC allows an organization to understand when emails have not been delivered and why. Examining DMARC reports provides insight into how to improve email delivery and avoid becoming flagged as spam.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malicious Content Flagging<\/h3>\n\n\n\n<p>Malicious emails may try to impersonate a brand, but DMARC will flag emails that do not match the \u201cfrom\u201d field with authenticated email sources. BEC phishing emails and other malicious emails will fail DMARC and prevent unauthorized senders from sending or spoofing emails that attempt to impersonate another organization. The increase in flagged emails inherently makes the entire email ecosystem more trustworthy and reduces the effectiveness of potential attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Impersonation Mitigation<\/h3>\n\n\n\n<p>Barracuda notes that attackers use <a href=\"https:\/\/www.barracuda.com\/spear-phishing-report\" target=\"_blank\" rel=\"noreferrer noopener\">brand impersonation in more than 80%<\/a> of spear-phishing attacks. These spoofing attacks use the credibility of the impersonated brand to improve the credibility of the message in the phishing email.<\/p>\n\n\n\n<p>DMARC can protect against spoofers by flagging emails sent from unauthorized domains. This will enable email servers to reject most spoofed phishing emails and lower the risk of having one\u2019s brand associated with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> or hackers. For some organizations, impersonation can be even more damaging than hackers, and DMARC can prevent unauthorized and damaging emails such as those <a href=\"https:\/\/www.valimail.com\/blog\/how-the-australian-labor-party-stops-email-impersonation-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">pretending to be from a political party<\/a> or other prominent organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved Email Reporting and Visibility<\/h3>\n\n\n\n<p>Organizations often send emails and never know if it is delivered. Other times, marketing teams notice email rejections but struggle to determine why the emails are flagged as spam.<\/p>\n\n\n\n<p>DMARC implementation generates reports that can be used to investigate rejected email in detail. These reports help to determine how to improve deliverability for direct emails and emails sent on behalf of the organization by third parties. Additionally, the reports can also provide information on attackers threatening the organization\u2019s brand reputation by attempting to spoof the organization in phishing and spam campaigns.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved Domain Reputation and Email Deliverability<\/h3>\n\n\n\n<p>Implementation of DMARC signals to the large ISPs that an organization has control over their email environment which improves the reputation of the organization\u2019s domain. Improved domain reputation can help to improve the deliverability of marketing emails and some organizations cite <a href=\"https:\/\/www.valimail.com\/blog\/what-is-dmarc-enforcement-and-why-is-it-so-important\/\" target=\"_blank\" rel=\"noreferrer noopener\">5% to 10% improvements in campaign delivery rates<\/a> after enforcing DMARC policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cons\">DMARC Disadvantages<\/h2>\n\n\n\n<p>Disadvantages to the DMARC standard include the possibility of email disruption, the fact that DMARC is an incomplete solution, poor return on investment (ROI) measurements, and that DMARC remains potentially spoofable. DMARC also requires active enforcement, email servers to support DMARC, and the DMARC reports themselves are unintuitive.<\/p>\n\n\n\n<p>Seth Blank, CTO of Valimail and co-chair of the DMARC Working Group, notes that \u201cDespite [DMARC\u2019s] growing popularity, fraudulent email remains the leading source of all cybercrime. Why does email provide such easy pickings for criminals? Because not enough businesses are at DMARC enforcement.\u201d<\/p>\n\n\n\n<p>Over 1.28 million domain owners have configured DMARC for their domains, but <a href=\"https:\/\/www.helpnetsecurity.com\/2021\/03\/23\/domains-protected-dmarc\/\" target=\"_blank\" rel=\"noreferrer noopener\">only 14% actually protect against spoofing<\/a> through enforcement. Even for large enterprises, DMARC can be difficult to fully implement despite the low cost of implementation.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Disruption<\/h3>\n\n\n\n<p>Successful implementation of DMARC requires iterations to discover overlooked email sources and to properly account for them in SPF, DKIM, and DMARC. An organization in a rush might strengthen their DMARC policy before identifying such sources and accidentally block and disrupt otherwise valid emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incomplete Solution<\/h3>\n\n\n\n<p>DMARC by itself cannot perform a useful role. DMARC requires the prior establishment of SPF and DKIM to enable email authentication. Additionally, even a robust DMARC setting only works if the email server receiving the email decides to enforce DMARC as well.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Poor ROI Measurements<\/h3>\n\n\n\n<p>Although DMARC can enable an organization to recognize reputation improvements and more reliably deliverable emails, these benefits will be difficult to quantify for return on investment (ROI) measurements. To make matters worse, the primary benefit of flagging malicious email content generally applies only to other organizations.<\/p>\n\n\n\n<p>Email servers and email security tools receiving and reviewing emails use the DMARC record to block spam and phishing email. DMARC will all but eradicate spoofing of internal emails which will be an enormous benefit to any organization. However, internal emails will always be a minority of the emails received by any organization so outside organizations will enjoy the majority of the benefit from verified emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Potentially Spoofable<\/h3>\n\n\n\n<p>DMARC prevents spoofing of an organization\u2019s specific domains. However, DMARC cannot prevent look-alike domain spoofing such as when attackers replace \u201cAmazon\u201d with \u201cArnazon\u201d or \u201cAmaz0n.\u201d Sophisticated attackers can even create SPF, DKIM, and DMARC files for their malicious domain so that the emails even pass DMARC checks!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Requires Active Enforcement<\/h3>\n\n\n\n<p>Only 14% of organizations that have deployed DMARC actually enforce DMARC. The others use the \u201cp=none\u201d setting to allow even phishing emails using their domain to be delivered despite failing DMARC.&nbsp;<\/p>\n\n\n\n<p>These organizations likely struggle to locate all email sources and are concerned about email disruption. However, failure to enforce DMARC gives a green light to imposters and attackers to abuse the organization\u2019s brand.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Requires Proper Email Server Settings<\/h3>\n\n\n\n<p>DMARC only works on email servers set up to check for DMARC, DKIM, and SPF or using email security tools to perform the same task. Servers can easily skip DMARC checks and allow spam and spoofing emails to proliferate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unintuitive Reports<\/h3>\n\n\n\n<p>Unfortunately, DMARC aggregate and forensic reports can be difficult for humans to read and interpret because they are formatted for machine ingestion. Most organizations need to obtain third-party DMARC reporting tools or monitoring services that can ingest the information and report in more intuitive fashions.<\/p>\n\n\n\n<p>Fortunately, many of these tools can provide additional data and insights beyond what\u2019s included within DMARC reports to help organizations to identify email senders faster and more accurately. These tools speed up the process of implementing DMARC authentication and reduce the risk of blocking legitimate email.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\">DMARC FAQ<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Do All Email Service Providers Support DMARC?<\/h3>\n\n\n\n<p>Unfortunately, no. The email service provider needs to set a custom Return-Path domain to collect email bounces separate from the email address used in the \u201cfrom\u201d address. This Return-Path domain must be at the same top-level domain as the \u201cfrom\u201d address, and some vendors do not always support this option.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Can DMARC Fail For Legitimate Sources?<\/h3>\n\n\n\n<p>Unfortunately, yes \u2014 primarily due to email forwarding or from overlooked email senders.&nbsp;<\/p>\n\n\n\n<p>An email provider may forward email to another address such as a newsletter sent to a customer that they forward from their main mailbox to their Gmail account. While most email providers will properly preserve the from address and Return-Path address, others may rewrite it, causing a SPF check failure. While this may present a problem, it is limited to a small percentage. In addition, ISPs can still consider if a message has DKIM present in this case and allow it to pass. This is why it is important to have both SPF and DKIM passing on a domain.<\/p>\n\n\n\n<p>Other times, some team members may start to use email sources without notifying the team responsible for updating email authentication. For example, marketing may add a HubSpot email marketing service or IT may enable a Zendesk IT ticketing system that sends tickets via email. If these sources are not properly added to SPF and DKIM, the otherwise legitimate emails will fail DMARC authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: Mature Organizations Should Pursue DMARC Email Authentication<\/h2>\n\n\n\n<p>DMARC email authentication can be a pain to set up and enforce, but it is worth the trouble. Any organization recognizable enough to be spoofed has a valuable brand that needs to be protected, and enforcing DMARC can radically reduce spoofing emails and improve delivery of legitimate emails. Every organization should strive to enforce DMARC to do their part to reduce spam, but more importantly, to protect themselves.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f84dd9a10-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f84dd9a10\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f84dd9a10\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f84dd9a10\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f84dd9a10\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f84dd9a10\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f84dd9a10\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn about DMARC email security technology from definitions and related technologies to pros and cons.<\/p>\n","protected":false},"author":271,"featured_media":30439,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[6700,839],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,379],"class_list":["post-7076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-dmarc","tag-email-security","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is DMARC Email Security Technology?<\/title>\n<meta name=\"description\" content=\"Learn about DMARC email security technology from definitions and related technologies to pros and cons.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DMARC Email Security Technology?\" \/>\n<meta property=\"og:description\" content=\"Learn about DMARC email security technology from definitions and related technologies to pros and cons.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-01T14:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-27T17:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"875\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"What Is DMARC Email Security Technology?\",\"datePublished\":\"2023-06-01T14:40:00+00:00\",\"dateModified\":\"2023-06-27T17:06:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\"},\"wordCount\":2527,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png\",\"keywords\":[\"DMARC\",\"email security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\",\"name\":\"What is DMARC Email Security Technology?\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png\",\"datePublished\":\"2023-06-01T14:40:00+00:00\",\"dateModified\":\"2023-06-27T17:06:09+00:00\",\"description\":\"Learn about DMARC email security technology from definitions and related technologies to pros and cons.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png\",\"width\":1400,\"height\":875,\"caption\":\"A virtual mail with a lock icon seemingly floating on a dark space.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is DMARC Email Security Technology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DMARC Email Security Technology?","description":"Learn about DMARC email security technology from definitions and related technologies to pros and cons.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/","og_locale":"en_US","og_type":"article","og_title":"What is DMARC Email Security Technology?","og_description":"Learn about DMARC email security technology from definitions and related technologies to pros and cons.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/","og_site_name":"eSecurity Planet","article_published_time":"2023-06-01T14:40:00+00:00","article_modified_time":"2023-06-27T17:06:09+00:00","og_image":[{"width":1400,"height":875,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"What Is DMARC Email Security Technology?","datePublished":"2023-06-01T14:40:00+00:00","dateModified":"2023-06-27T17:06:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/"},"wordCount":2527,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png","keywords":["DMARC","email security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/","url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/","name":"What is DMARC Email Security Technology?","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png","datePublished":"2023-06-01T14:40:00+00:00","dateModified":"2023-06-27T17:06:09+00:00","description":"Learn about DMARC email security technology from definitions and related technologies to pros and cons.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-what-is-dmarc.png","width":1400,"height":875,"caption":"A virtual mail with a lock icon seemingly floating on a dark space."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is DMARC Email Security Technology?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7076"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7076"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7076\/revisions"}],"predecessor-version":[{"id":30860,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7076\/revisions\/30860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30439"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7076"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7076"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7076"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}