DMARC Record Generator
Generate a valid DMARC TXT record for your domain. Configure your policy, reporting addresses, and advanced settings below.
Domain
Policy
Reporting
| RUA | RUF | ||
|---|---|---|---|
| domain.com@rua.dmarcdkim.io Recommended | |||
| domain.com@ruf.dmarcdkim.io |
Advanced Settings
Your DMARC Record
Fill in the details and your DMARC record will appear here.
- Type
- TXT
- Host/Name
-
- Value
-
v=DMARC1; p=none
Next steps
Publish this TXT record at your DNS provider, then run the DMARC Check tool to confirm it's live.
DMARC Record Cheatsheet
A detailed guide to the DMARC tags you'll actually configure. The mandatory v=DMARC1 version tag is always the first field and never varies.
| Parameter | Options | Guidance & recommendation |
|---|---|---|
|
p
Policy |
|
Start with Our recommendation none
for new setups. Work toward
reject
over time.
|
|
rua
Aggregate reports |
One or more email addresses prefixed with mailto:e.g. rua=mailto:dmarcdkim.com@rua.dmarcdkim.io |
You get a daily summary (XML) showing which servers sent mail using your domain and whether they passed SPF and DKIM. Essential for monitoring. Our recommendation Always set this. Without it, you're flying blind and won't know if legitimate email is being affected. |
|
ruf
Forensic reports |
One or more email addresses prefixed with mailto:e.g. ruf=mailto:dmarcdkim.com@ruf.dmarcdkim.io |
You get a DMARC forensic report each time an individual email fails authentication. Useful for debugging specific failures during setup and for investigating attacks. Our recommendation Set this for debugging. Note that some providers (e.g. Gmail) don't send forensic reports due to privacy policies. |
|
sp
Subdomain policy |
|
Set this when subdomains need a different policy than the main domain. If you don't set it, subdomains inherit the main domain's policy.
Our recommendation
Omit to inherit policy from |
|
pct
Percentage |
A number from 0 to 100 Default: 100 (all emails) |
Apply your full policy to only a portion of failing emails. The remainder is handled one level down. With
Our recommendation
Omit when at |
|
adkim
DKIM alignment |
|
Use strict during monitoring ( Our recommendation s (strict)
to minimize the impact of a potentially leaked or cracked DKIM private key.
|
|
aspf
SPF alignment |
|
Many email services (e.g. Mailchimp, Zendesk) send from subdomains like bounces.example.com on behalf of example.com. Relaxed accepts this and avoids false failures, while strict would reject it. Only pick strict if every sender uses the exact From domain. Our recommendation r (relaxed)
for compatibility with third-party email services.
|
|
ri
Reporting interval |
Any integer number of seconds. Common values:
|
Hourly reports give faster feedback, especially when you're making changes to SPF/DKIM. Once stable, daily is fine. Note: some providers always send daily regardless. Our recommendation 3600 (hourly)
for faster feedback during setup and ongoing monitoring.
|
|
fo
Failure reporting |
|
The default Our recommendation 1:d:s
for complete coverage of all failure types.
|
|
rf
Report format |
|
This is the only format currently in use. There's no practical reason to change it. Our recommendation Leave as default. No action needed. |