Ultra Web Hosting

DMARC Record Generator

Generate a valid DMARC record for your domain. Set your enforcement policy, reporting addresses, alignment, and get a ready-to-paste DNS TXT record.

DMARC Record Generator

Build a valid DMARC record for your domain. DMARC ties SPF and DKIM together and tells receiving mail servers what to do when email fails authentication — monitor, quarantine, or reject. Set your policy, reporting addresses, and alignment preferences below.

Build Your DMARC Record
Your Domain
Domain Policy (p)
What should receiving servers do when an email fails both SPF and DKIM checks?
Monitor only — failed messages are delivered normally. Start here to collect data before enforcing.
Subdomain Policy (sp) — optional
Override the policy for subdomains (e.g., mail.example.com). If not set, subdomains inherit the main policy.
Percentage (pct) — optional
Percentage of failing messages the policy applies to. Use for gradual rollout (e.g., start at 10%, increase to 100%).
% of failing messages
Reporting
Where should receiving servers send DMARC reports? Aggregate reports (rua) are essential — they show who is sending email as your domain.
XML reports sent daily by receiving servers. Add multiple addresses separated by commas.
Per-message failure details. Optional — many providers don't send these due to privacy.
Alignment — optional
Alignment controls how strictly the From domain must match SPF and DKIM domains. Relaxed allows subdomain matches; strict requires exact matches.
Failure Reporting Options (fo) — optional
Generated DMARC Record
Record Type
TXT
Host / Name
_dmarc
Value
(shown below)
v=DMARC1; p=none;
click to copy
Record Length
Recommended Rollout
Phase 1 — Monitor: Start with p=none and an rua address. Collect reports for 2-4 weeks to identify all legitimate senders.
Phase 2 — Quarantine: Switch to p=quarantine; pct=10 and gradually increase pct to 100 as you confirm all senders pass.
Phase 3 — Reject: Move to p=reject for full enforcement. Spoofed emails will be blocked.

About This Tool

DMARC is the policy layer that ties SPF and DKIM together and tells receiving mail servers what to do when authentication fails. Setting up DMARC involves choosing an enforcement policy, configuring aggregate and forensic reporting, and deciding on alignment strictness. This generator walks you through each setting with clear explanations and builds the complete TXT record in real time. It also includes a recommended rollout plan: start with monitoring (p=none), move to quarantine, and finally enforce rejection for maximum protection against email spoofing.

How to Use

Enter your domain name, select your enforcement policy (none, quarantine, or reject), and add an email address for aggregate reports. The tool builds the DMARC record live as you adjust settings. Optional fields include subdomain policy, percentage for gradual rollout, forensic reporting, alignment mode, and failure reporting options. Only non-default values are included in the record to keep it concise. The tool also warns you if your reporting address is on a different domain, which requires additional DNS authorization.

Tips & Best Practices

Always start with p=none and an rua reporting address. Collect aggregate reports for at least two weeks before enforcing. Use a DMARC report analyzer service to make the XML reports readable. When you are ready to enforce, use pct to roll out gradually: start with pct=10, increase to 25, 50, then remove the pct tag entirely for 100% coverage. Set the subdomain policy (sp) explicitly if subdomains should not send email. Cross-domain reporting (rua address on a different domain) requires a special DNS authorization record at the receiving domain.

Need reliable hosting? These free tools are brought to you by Ultra Web Hosting. Fast, secure shared and reseller hosting with 24/7 expert support. View hosting plans →