RM Logo
Technical Rating: 
Support Home PageSupport
Print This PagePrint This Page
Add to 'My Library' Add to 'My Library'

DMARC reports analysis and recommendations
Published Date : 24 May 2022   Last Updated : 03 Oct 2024   Content Ref: TEC8571263  





Requirements

About DMARC reports

We can configure DMARC to receive reports from email servers that get emails from your domain. Your DMARC record can specify where to send these reports. You can use the information in these reports to fine-tune your email authentication policy to permit only trusted senders to send emails on behalf of your email domain.

With the help of this reporting mechanism, email receivers can tell you:

  • whether the email they received from your domain passed or failed authentication.
  • which servers or third-party senders are using your domain to send emails.
  • which servers or services are sending messages that fail DMARC.
  • what DMARC actions the receiving server takes on unauthenticated email messages from your domain. The action will be based on the DMARC policy configured in your DMARC record.

Analysing DMARC aggregate reports

The aggregate reports are XML documents that contain IP addresses, domain names and authentication information for emails that the receiver has seen sending as that domain. These XML reports can be hundreds or thousands of lines long, depending on how many email messages are sent from that domain around the world. You may have to invest additional time and resources to perform a technical analysis of the reports to consider if you need to update SPF, DKIM and DMARC records to ensure that the services are properly authorised.

Note: Instead of manually parsing the massive amount of XML-based IP address data that you get in DMARC reports, there are third-party service providers who can help you with DMARC aggregate report analysis and turn them into an easily readable list of named services.


Recommended actions based on report analysis

Note: To update your DNS records for SPF, DKIM and DMARC, you need to contact your service provider (domain registrar) and ask them to make the changes required to align with your analysis.

DMARC policy enforcement
A DMARC record with policy 'p=reject' is the stricter enforcement. The stricter enforcement better protects your domain from spoofing. However, the recommendation is to follow the below guidelines:

  • It is recommended that you start with policy 'p=none' then analyse DMARC reports at this level for some time to identify whether they require any action to allow your third-party senders (if any) for your domain.
  • When you are confident and understand your organisation's email flow and authentication from the reports, you need to update your DMARC record and move to the policy 'p=quarantine'. Again, you need to be in this level for some time and analyse reports before you move to the stricter DMARC policy.
    Note: We would recommend a minimum of six weeks at each level above to allow for the monthly processing to take place and identified, but possibly longer if that period spans a school holiday.
  • Finally, you need to get to DMARC policy enforcement, i.e. move to policy 'p=reject'.

Update SPF record for your domain
The primary purpose of analysing aggregate reports is to identify legitimate email sources which fail authentication checks. Messages sent from servers that are not included in your SPF record can fail authentication. Check your SPF record to ensure that it includes all IP addresses and domains that are allowed to send emails from your domain. If all legitimate sources are not included, you will have to update your SPF record so that emails from these legitimate sources pass authentication next time. To update the SPF record for your domain, please refer to the relevant links below:

DKIM checks
You need to check if all the messages sent from your domain are failing DKIM checks. If so, probably there is a problem with your DNS DKIM record. You will have to verify and update the DKIM key published.

To troubleshoot Google Workspace DKIM issues, please refer to the link: Troubleshoot DKIM issues.

To verify if DKIM signing is configured properly for Microsoft® 365™, please refer to the link: Confirm DKIM signing.



More Information

For more information about DMARC, please refer to TEC8570415 in the Other Useful Articles section below.


Other Useful Articles

Information about DMARC (Domain-based Message Authentication, Reporting and Conformance) (TEC8570415)

FEEDBACK
Did the information in this article help answer your question?
 Yes
 No
Please add any comments about this article in the box below. If you answered No then it is important you tell us why so that we can change the article if required. We can only respond if you log in to the RM Support website or provide your contact details. Note: If you need help with a technical query, please log a call online or telephone our support team.
Thank you for your feedback, which is sent directly to the RM Knowledge team. We address every message received with the intention of improving our Knowledge Library articles. If you have an unresolved technical issue, please contact RM Support.


If this article has not helped provide a solution then it is also possible to log a call...



Document Keywords: DMARC, DKIM, SPF, Email Authentication, Spoofing, Phishing, Report, Analysis, TEC8571263


Please read - important disclaimer information.
http://www.rm.com/_RMVirtual/Includes/csredirect.asp?cref=&title=Standard Content Disclaimer


Top Of PageTop of page