Page contents
Sendmarc makes it easy to enforce DMARC alignment – so the domain in your email’s ‘From’ address matches what’s validated by SPF and DKIM. This prevents impersonation, improves deliverability, and ensures your domain is protected from spoofing and fraud.
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a vital email authentication protocol that helps companies protect their domains from unauthorized use, such as phishing, spoofing, and email fraud.
DMARC builds on two foundational standards:
It allows domain owners to specify how email receivers should handle messages that fail authentication and provides detailed reports to monitor email activity.
Email is one of the most common entry points for cybercriminals. Spoofing attacks – where attackers send emails that appear to come from your domain – can result in data breaches, financial loss, and brand damage.
DMARC helps reduce this risk by:
To understand how DMARC works, it’s helpful to break it down into three key components:
DMARC uses SPF and DKIM to validate emails:
Domain owners receive aggregate and forensic reports from email receivers. These reports highlight authentication results and potential misuse.
DMARC policies tell receivers how to handle emails that fail authentication:
By combining these elements, DMARC empowers domain owners to protect their email environments and their reputations.
DMARC alignment is a core concept within the DMARC framework. It ensures that the domain shown in the ‘From’ address of an email matches the domain used by SPF and/or DKIM.
In simple terms, alignment confirms that the sender’s identity is consistent and trustworthy.
Without alignment, unauthorized emails could reach users.
For example, an attacker might use an authorized IP address to pass SPF, but set a different ‘From’ domain to mislead the recipient. DMARC alignment prevents this tactic by requiring that the domain in the ‘From’ header aligns with the domain authenticated by SPF and/or DKIM.
Alignment is foundational for effective DMARC enforcement. If alignment fails, the message is considered unauthenticated, and the DMARC policy will determine the next step – whether that’s taking no action, quarantining the email, or rejecting it entirely.
This mechanism protects your domain’s reputation and helps prevent phishing attacks from reaching your audience.
DMARC offers two alignment modes that determine how closely the domains must match:
DMARC alignment mode | Description | When to use |
---|---|---|
Strict | Requires an exact match between the domain in the ‘From’ address and the domain authenticated by SPF or DKIM. For example, [email protected] must match example.com. | Ideal for high-security environments or sensitive data. Use when you control all your sending sources. |
Relaxed | Allows alignment if the domains share the same organizational domain. For example, [email protected] aligns with example.com. | Best for setups using multiple subdomains or third-party platforms like marketing or CRM tools. |
An organizational domain is the main registered domain. For example, in mail.example.com, the organizational domain is example.com.
Relaxed alignment treats an email as aligned if the authenticated domain is either the same as or a subdomain of the domain in the ‘From’ header.
Use this when your business directly manages all sources of outbound email. It provides the highest level of protection but might cause legitimate messages to fail if they’re from an external source or subdomain.
Recommended for companies using subdomains or third-party services to send email. It offers a good balance between email security and deliverability by allowing limited domain variation.
DMARC alignment is verified during the email authentication process by comparing the domains used in SPF and DKIM with the domain in the ‘From’ header.
Let us say an email is sent from [email protected] with a ‘From’ address of [email protected]:
Since mail.example.com is a subdomain of example.com, alignment passes.
The domains don’t exactly match, so alignment fails.
This example shows why selecting the appropriate DMARC alignment mode is essential.
Ensuring proper DMARC alignment requires proactive troubleshooting.
Not including all legitimate IP addresses, especially third-party platforms.
Using a signing domain that doesn’t align with the ‘From’ address.
Forwarders might break SPF alignment because they use their own IP addresses.
Misconfigured aspf
and adkim
tags can enforce overly strict alignment.
Confirm all sending IPs are listed in your SPF DNS record.
Ensure the d=
tag in your DKIM signature aligns with your ‘From’ domain.
If strict alignment causes failures, switch temporarily to relaxed mode and monitor results.
Use reports to identify problem sources and detect misconfigurations.
Test from all sources and review headers to verify alignment for each message.
A strategic, phased approach is key to successful DMARC alignment. These best practices will help strengthen email security while maintaining deliverability:
aspf
(SPF alignment) and adkim
(DKIM alignment) tags in your DMARC DNS record to define strict (s
) or relaxed (r
) alignment modes.Following these best practices helps protect your domain and reputation.
Sendmarc’s user-friendly platform simplifies DMARC alignment and email security management.
With Sendmarc, you can:
Take control of your domain’s email security with Sendmarc.
DMARC alignment ensures that the domain shown in the email’s ‘From’ header matches the domains authenticated by Sender Policy Framework (SPF) and/or DomainKeys Identified Mail (DKIM). This confirms that the sender’s identity is consistent and legitimate, helping prevent domain spoofing.
The alignment mode for DMARC determines how closely the authenticated domains must match the ‘From’ domain. There are two alignment modes:
Strict: Requires an exact domain match.
Relaxed: Allows a match at the organizational domain level.
These modes can be configured separately for SPF (aspf
) and DKIM (adkim
) in your DMARC DNS record.
To fix a DMARC alignment failure, review and update your SPF and DKIM DNS records to include all authorized sending sources. Ensure that DKIM signatures use a domain aligned with the ‘From’ address. If needed, adjust the DMARC alignment mode from strict to relaxed.
Yes, an email can pass SPF and DKIM authentication checks but still fail DMARC alignment. This happens when the domains used in SPF and DKIM don’t match the ‘From’ domain as required by the configured DMARC alignment mode (strict or relaxed). In such cases, the message might be treated as unauthenticated depending on your DMARC policy.