Skip to main content

Command Palette

Search for a command to run...

DMARC in the News: What’s New in Email Security (2025)

Updated
3 min read

Email threats are evolving fast—and so is the way we defend against them. Here’s what’s making headlines in the world of DMARC this summer:

1. Most Domains Still Aren’t Blocking Spoofed Emails

Only 7.7% of the top 1.8 million domains use the strictest DMARC policy, p=reject, which actively blocks spoofed emails. The vast majority stick with p=none, where they only passively monitor issues. As phishing gets more sophisticated—especially with AI-driven attacks—this enforcement gap leaves many vulnerable

2. Google Gives DMARC Reports a Visibility Boost

Google has enhanced its DMARC aggregate reports by adding failure diagnostics directly into the XML feedback. Now, you’ll not only see that authentication failed—you’ll also get a clear reason via the new <comment> field under <reason>. This helps organizations pinpoint and resolve issues faster

3. Microsoft Cracks Down on Bulk Senders

As of May 5, 2025, Microsoft is rejecting (not just filtering) bulk emails that fail SPF, DKIM, or DMARC. This applies to any sender dispatching more than 5,000 messages per day to Microsoft domains (Outlook.com, Hotmail, Live.com). Messages failing authentication trigger a 550; 5.7.15 Access denied error—and may face full rejection soon

4. Internal Commitment, Not Just External Pressure

A recent EasyDMARC survey found that while awareness of DMARC is improving—75% of U.S. organizations have it set up—only 40% enforce strong policies like quarantine or reject. This suggests that real protection comes when internal teams actively manage and uphold DMARC—not just when it's required externally


Why These Updates Matter

1. Email Authentication Is Becoming Non-Negotiable

With providers like Microsoft enforcing strict authentication and Google providing more diagnostic clarity, DMARC (alongside SPF and DKIM) is quickly becoming vital for inbox delivery and security.

2. Monitoring Alone Isn’t Enough

Having a DMARC record is just the starting point. Without enforcement (p=reject) and internal ownership, domains remain exposed to impersonation—even if they have a passive “monitor-only” setup.

3. Full Visibility Is Powerful

Thanks to enhanced reporting from providers like Google, identifying and resolving failures isn’t just faster—it’s actionable.


What You Should Do

ActionWhy It Matters
Set DMARC to p=quarantine or p=rejectStop fraudulent emails from reaching recipients.
Use enhanced diagnostics (e.g., Google’s <comment> field)Pinpoint and fix authentication issues quickly.
Prioritize internal ownershipEnsure DMARC policies evolve with your email ecosystem.
Regularly monitor and update SPF, DKIM, DMARCPrevent reappearance of misconfigurations as systems change.

Final Thoughts

DMARC is no longer optional—it's critical. With email providers tightening rules and phishing attacks accelerating, maintaining robust, enforced email authentication is essential. Monitoring is good, but it’s enforcement and ownership that protect brands and inboxes.

Want help simplifying this? Tools like DMARCeye can translate complex reports into clear action, alert when things go wrong, and help you stay compliant—effortlessly.

Let me know if you’d like a detailed guide on configuring DMARC to reject or quarantine, or how to integrate alerts into your workflow!