About This Tool
DMARC is the policy layer that ties SPF and DKIM together and tells receiving mail servers what to do when authentication fails. Setting up DMARC involves choosing an enforcement policy, configuring aggregate and forensic reporting, and deciding on alignment strictness. This generator walks you through each setting with clear explanations and builds the complete TXT record in real time. It also includes a recommended rollout plan: start with monitoring (p=none), move to quarantine, and finally enforce rejection for maximum protection against email spoofing.
How to Use
Enter your domain name, select your enforcement policy (none, quarantine, or reject), and add an email address for aggregate reports. The tool builds the DMARC record live as you adjust settings. Optional fields include subdomain policy, percentage for gradual rollout, forensic reporting, alignment mode, and failure reporting options. Only non-default values are included in the record to keep it concise. The tool also warns you if your reporting address is on a different domain, which requires additional DNS authorization.
Tips & Best Practices
Always start with p=none and an rua reporting address. Collect aggregate reports for at least two weeks before enforcing. Use a DMARC report analyzer service to make the XML reports readable. When you are ready to enforce, use pct to roll out gradually: start with pct=10, increase to 25, 50, then remove the pct tag entirely for 100% coverage. Set the subdomain policy (sp) explicitly if subdomains should not send email. Cross-domain reporting (rua address on a different domain) requires a special DNS authorization record at the receiving domain.