<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DMARC on Sender Audit Blog</title><link>https://senderaudit.com/blog/en/tags/dmarc/</link><description>Recent content in DMARC on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 28 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/tags/dmarc/index.xml" rel="self" type="application/rss+xml"/><item><title>Shadow IT and Email: The Tools Sending on Your Behalf Without You Knowing</title><link>https://senderaudit.com/blog/en/shadow-it-email/</link><pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/shadow-it-email/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;, &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt;, and &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt;. Your email infrastructure is under control. Then one day, while analyzing your &lt;a href="https://senderaudit.com/blog/en/understanding-dmarc-reports/"&gt;DMARC reports&lt;/a&gt;, you discover dozens of unknown IPs sending emails on behalf of your domain. Not phishing - internal tools that nobody in IT ever approved.&lt;/p&gt;
&lt;p&gt;Welcome to the world of &lt;strong&gt;email shadow IT&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="what-is-email-shadow-it"&gt;What Is Email Shadow IT&lt;/h2&gt;
&lt;p&gt;Shadow IT refers to the use of technology services without explicit approval from the IT team. Applied to email, it&amp;rsquo;s extremely common: business teams configure SaaS tools to send emails from your domain without going through IT.&lt;/p&gt;</description></item><item><title>Email and DNS: Every Record You Need to Know</title><link>https://senderaudit.com/blog/en/email-and-dns/</link><pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-and-dns/</guid><description>&lt;p&gt;DNS is the invisible foundation of email. Without the right records, your emails won&amp;rsquo;t be delivered, authenticated, or encrypted. Here are &lt;strong&gt;all the DNS records&lt;/strong&gt; a sending domain needs to know and configure.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Record&lt;/th&gt;
 &lt;th&gt;Type&lt;/th&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MX&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;MX&lt;/td&gt;
 &lt;td&gt;Where to deliver emails for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;SPF&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Who can send for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DKIM&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT/CNAME&lt;/td&gt;
 &lt;td&gt;Public key for verifying signatures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DMARC&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;SPF + DKIM alignment policy&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MTA-STS&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT + HTTPS&lt;/td&gt;
 &lt;td&gt;Enforce TLS encryption&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;TLS-RPT&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Reports on TLS failures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;BIMI&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Verified logo in the inbox&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PTR&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;PTR&lt;/td&gt;
 &lt;td&gt;Reverse DNS for your sending IPs&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="mx-where-to-deliver-emails"&gt;MX: Where to Deliver Emails&lt;/h2&gt;
&lt;p&gt;The MX (Mail Exchange) record specifies which servers receive emails for your domain.&lt;/p&gt;</description></item><item><title>Email Headers Explained: From Received to ARC</title><link>https://senderaudit.com/blog/en/email-headers-explained/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-headers-explained/</guid><description>&lt;p&gt;Email headers contain the complete story of a message&amp;rsquo;s journey: who sent it, which servers it passed through, whether authentication succeeded, and why it landed in spam. Knowing how to read them means knowing how to diagnose.&lt;/p&gt;
&lt;h2 id="how-to-access-headers"&gt;How to Access Headers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Gmail&lt;/strong&gt;: open the email → ⋮ → &amp;ldquo;Show original&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Outlook&lt;/strong&gt;: open the email → File → Properties → &amp;ldquo;Internet headers&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Apple Mail&lt;/strong&gt;: View → Message → All Headers&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Thunderbird&lt;/strong&gt;: View → Message Source&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Or paste them directly into Sender Audit&amp;rsquo;s &lt;a href="https://senderaudit.com/header-analyzer"&gt;Header Analyzer&lt;/a&gt; for a visual analysis.&lt;/p&gt;</description></item><item><title>DMARC: Safely Migrating from p=none to p=reject</title><link>https://senderaudit.com/blog/en/dmarc-none-to-reject/</link><pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dmarc-none-to-reject/</guid><description>&lt;p&gt;You&amp;rsquo;ve published your &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; record with &lt;code&gt;p=none&lt;/code&gt;. That&amp;rsquo;s a good start, but &lt;code&gt;p=none&lt;/code&gt; blocks nothing: fraudulent emails still get through. The end goal is &lt;code&gt;p=reject&lt;/code&gt;, and this guide walks you through the migration without breaking your legitimate mail flows.&lt;/p&gt;
&lt;h2 id="why-pnone-isnt-enough"&gt;Why p=none Isn&amp;rsquo;t Enough&lt;/h2&gt;
&lt;p&gt;With &lt;code&gt;p=none&lt;/code&gt;, you&amp;rsquo;re asking mailbox providers to &lt;strong&gt;do nothing&lt;/strong&gt; when an email fails DMARC. You receive RUA reports, but:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Emails spoofing your domain still reach inboxes&lt;/li&gt;
&lt;li&gt;Your domain can be used for phishing&lt;/li&gt;
&lt;li&gt;Google and Yahoo now require a published DMARC record, but the real benefits start at &lt;code&gt;p=quarantine&lt;/code&gt; or &lt;code&gt;p=reject&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="recommended-timeline"&gt;Recommended Timeline&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Week&lt;/th&gt;
 &lt;th&gt;Policy&lt;/th&gt;
 &lt;th&gt;Goal&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;W1-W2&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=none; rua=mailto:...&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Collect reports, inventory sources&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W3-W4&lt;/td&gt;
 &lt;td&gt;Report analysis&lt;/td&gt;
 &lt;td&gt;Identify each source IP, fix SPF/DKIM&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W5-W6&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Test on 10% of traffic&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W7-W8&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Gradually increase&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W9-W10&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=100&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Observe for 2 weeks&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W11-W12&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Begin gradual rejection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W13-W14&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Scale up&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W15+&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=100; sp=reject&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Full protection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This timeline is indicative. The key is to &lt;strong&gt;never skip a step&lt;/strong&gt; without verifying that reports are clean.&lt;/p&gt;</description></item><item><title>Reading and Understanding DMARC Reports (RUA)</title><link>https://senderaudit.com/blog/en/understanding-dmarc-reports/</link><pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/understanding-dmarc-reports/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; with a &lt;code&gt;rua=&lt;/code&gt; tag and reports are starting to arrive. But what do you do with these often incomprehensible XML files? This guide teaches you how to read them, interpret them, and take concrete action.&lt;/p&gt;
&lt;h2 id="what-is-a-dmarc-rua-report"&gt;What Is a DMARC RUA Report&lt;/h2&gt;
&lt;p&gt;An RUA (Report URI Aggregate) report is an XML file sent daily by mailbox providers (Google, Microsoft, Yahoo, etc.) to the address defined in your DMARC record.&lt;/p&gt;</description></item><item><title>How to Configure DMARC to Protect Your Domain</title><link>https://senderaudit.com/blog/en/configure-dmarc/</link><pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dmarc/</guid><description>&lt;p&gt;DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that protects your domain against spoofing and phishing. In this guide, we&amp;rsquo;ll walk through how to set it up properly.&lt;/p&gt;
&lt;h2 id="why-dmarc-is-essential"&gt;Why DMARC Is Essential&lt;/h2&gt;
&lt;p&gt;Without DMARC, anyone can send emails pretending to be your domain. The consequences are serious:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Phishing&lt;/strong&gt;: malicious actors can impersonate your brand&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Damaged reputation&lt;/strong&gt;: ISPs may penalize your domain&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lost trust&lt;/strong&gt;: your recipients can no longer tell which emails are legitimate&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;According to the FBI, business email compromise (BEC) scams, many of which exploit missing DMARC, caused over $2.7 billion in losses in 2022 alone.&lt;/p&gt;</description></item></channel></rss>