DMARC troubleshooting checklist: Step-by-step to fixing DMARC

Emails failing DMARC? Don't worry. You're not alone. Our troubleshooting DMARC checklist shows you how to solve security checks and restore flow.
DMARC troubleshooting checklist

You’re getting reports of emails not being delivered, your authentication is failing, and suddenly your inbox is flooded with bouncebacks. Sound familiar? If you’re nodding your head right now, you’re probably dealing with DMARC issues. Don’t panic, though—you’re not alone.

The truth is, DMARC problems can feel like trying to find your keys in a dark room. You know they’re there somewhere, but you keep bumping into furniture along the way. Sometimes it’s a simple DNS record typo throwing everything off. Other times, it’s a complex web of third-party senders and misaligned identifiers causing the problem.

That’s why we’ve created this DMARC troubleshooting checklist. No fluff, no unnecessary tech jargon. It’s just a practical, step-by-step guide to get your email authentication back on track. Whether you’re new to DMARC or an authentication pro who just needs a systematic approach to problem-solving, this checklist will help you identify (and fix) what’s wrong.

Why you need a DMARC troubleshooting checklist

Your DMARC reports are showing authentication failures, someone from the sales team can’t get their emails to land in customer inboxes, and marketing is wondering why their latest campaign is stuck in spam folders. Without a clear plan of attack, you could spend hours (or even days) trying to find what’s wrong.

Each piece of the DMARC puzzle needs to fit perfectly: SPF, DKIM, alignment, and policies. Miss one small detail, and the whole picture falls apart. That tiny typo in your DNS record? It matters. That marketing tool you added last month? It could be the culprit. Is the third-party service sending emails on your behalf? They might be accidentally breaking your authentication.

How-DMARC-Policy-Works.svg

Fortunately, most DMARC issues follow patterns. A systematic approach helps you identify and fix problems faster, avoid overlooking critical steps, and prevent the same issues from popping up again. Instead of random guessing or jumping from one possible solution to another, a checklist gives you a clear, consistent path forward.

Before you start troubleshooting…

You might be tempted to start digging around from the get-go, but take a second to get your troubleshooting toolkit ready. 

First, gather your email data. You’ll need:

  • Your current DNS records (DMARC, SPF, and DKIM)
  • Recent DMARC aggregate reports
  • A list of all services that send email on your behalf
  • Any recent changes to your email infrastructure
  • Reports of specific delivery problems from your team

Next, make sure you have access to these tools:

  • Valimail’s domain checker
  • A DNS lookup tool (like dig or online DNS checkers)
  • DMARC report analyzer
  • SPF record validator
  • DKIM testing tools
  • Access to your DNS management console

One more thing: Take a quick snapshot of your current email authentication setup. Note your successful delivery rates, authentication pass rates, and any existing issues. This will be your baseline, and it’s helpful for measuring improvements as you work through the checklist.

The step-by-step DMARC troubleshooting guide

1. Check your DMARC record Syntax

One small typo, and suddenly your instructions make no sense to receiving mail servers.

First, look up your DMARC record. It should be at “_dmarc.yourdomain.com”. Here’s what to check:

  • Does the record start with “v=DMARC1”? This is your version tag, and it needs to be there
  • Is your policy tag (p=) present and set correctly? This tells receiving servers what to do with failed messages
  • Check your formatting: no spaces around equal signs, semicolons between tags
  • Make sure you don’t have any rogue characters or line breaks

Common syntax mistakes to watch for:

  • Missing semicolons between tags
  • Incorrect spacing around values
  • Typos in tag names (like “pct” written as “ptc”)
  • Multiple DMARC records (you should only have one)

If your DMARC record looks like this, you’re on the right track:

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; pct=100

Check your domain for free here:

Check your
domain now

Enter your domain to see if it’s vulnerable to spoofing or if others are sending emails on your behalf. Instantly check your DMARC, SPF, and BIMI status with a detailed security report.

You’re not fully protected, learn more here.

Check your
domain now

Enter your domain to see if it’s vulnerable to spoofing or if others are sending emails on your behalf. Instantly check your DMARC, SPF, and BIMI status with a detailed security report.

You’re not fully protected, learn more here.

Check your
domain now

Enter your domain to see if it’s vulnerable to spoofing or if others are sending emails on your behalf. Instantly check your DMARC, SPF, and BIMI status with a detailed security report.

You’re not fully protected, learn more here.

View Full Report

Your Domain

Not protected AGAINST IMPERSONATION ATTACKS

DMARC NOT AT ENFORCEMENT

exampledomain1.com

Authentication Status for January 10, 2025

DMARC at Enforcement

SPF Record Configured

BIMI Ready

exampledomain1.com

Authentication Status for January 10, 2025

DMARC at Enforcement

SPF Record Configured

BIMI Ready

2. Verify your SPF record

SPF records tell the world which servers are allowed to send mail from your domain. But even one small mistake can cause legitimate emails to get turned away.

Start by looking up your SPF record at your root domain. Here’s what to check:

  • Make sure you have exactly one SPF record (multiple records will cause problems)
  • Verify it starts with “v=spf1” (not spf2 or anything else)
  • Check that all your legitimate email sources are included
  • Look for the all-important 10 DNS lookup limit

The 10-lookup limit is a common troublemaker. Your SPF record might look fine at first glance, but if you’re including multiple services that each make their own lookups, you could be hitting this ceiling without realizing it. When that happens, some receiving servers might not process your entire record, leading to authentication failures.

Watch out for these SPF pitfalls:

  • Using too many include statements
  • Forgetting to list new email sending services
  • Including unnecessary IP addresses or domains
  • Missing the trailing mechanism (like -all or ~all)

A clean SPF record might look something like this:

v=spf1 include:_spf.google.com include:sendgrid.net include:mailchimp.com -all

3. Review your DKIM configuration

DKIM proves your emails haven’t been tampered with since leaving your domain. However, if it’s not properly set up, it won’t do its job.

First, check your DKIM setup:

  • Verify your DKIM selector exists in DNS (Check selector._domainkey.yourdomain.com)
  • Make sure your public key is published and formatted correctly
  • Check that your key hasn’t expired (yes, that happens more often than you’d think)
  • Confirm you’re using a strong enough key (2048-bit is recommended)
  • Test DKIM signing across all your email streams

One of the trickiest parts of DKIM configuration is managing multiple selectors. Maybe you’ve got one for marketing emails, another for your help desk, and another for your CRM. Each needs its own properly configured record.

Common DKIM headaches to watch for:

  • Mismatched public/private key pairs
  • Expired DKIM keys (especially if you’re using automated rotation)
  • Wrong selector names in your email headers
  • Missing or incomplete DNS records
  • Keys that are too short (1024-bit or less)

Tip: Don’t forget to test DKIM signing for emails from different sources. Just because your marketing emails are signed correctly doesn’t mean your support tickets are too.

4. Check identifier alignment

There are two types of alignment to check:

SPF alignment

  • Does your From: domain match the domain in your SPF record?
  • Are you sending from subdomains but authenticating at the parent domain?
  • Is your alignment mode set to “strict” when it should be “relaxed”?

DKIM alignment

  • Does your From: domain match your DKIM d= domain?
  • Are your marketing tools signing with their own domains instead of yours?
  • Have you checked alignment for all your email streams?

Here’s a real-world example that trips up many organizations: Your marketing email shows:

From: newsletter@company.com

SPF domain: email-service.com

DKIM d= domain: email-service.com

This will fail alignment because neither the SPF nor DKIM domains match your From: domain.

Quick fixes to try:

  • Switch to relaxed alignment if strict is causing problems
  • Configure third-party services to sign with your domain
  • Update your From: addresses to match your authentication domains
  • Use proper delegation for third-party senders

5. Look at your DMARC reports

DMARC reports tell you exactly what’s passing, what’s failing, and where the problems are. Unfortunately, raw DMARC reports can look about as friendly as a wall of Matrix code. That’s where a solution like Valimail Monitor can help—it eliminates the XML nonsense and gives you straight insights and action items. Oh, and it’s free.

Here’s what to focus on when reviewing your reports:

Start with the basics:

  • What percentage of your emails are passing authentication?
  • Which sending sources are failing most often?
  • Are there any unexpected domains sending mail?
  • Do the failure patterns point to specific issues?

Look for these red flags:

  • Sudden drops in authentication pass rates
  • Unknown IP addresses are sending mail
  • Mismatched authentication results
  • Specific receivers are reporting high failure rates
  • Unexpected volume spikes

6. Double-check your sending infrastructure

Even with perfect DMARC, SPF, and DKIM records, issues in your sending infrastructure can cause authentication failures. Here’s what to verify:

Start with these checks:

  • Confirm all sending IP addresses have correct reverse DNS (PTR records)
  • Verify your server clocks are properly synchronized
  • Check that TLS certificates are valid and current
  • Look up your IPs on major blocklists to ensure they’re clean

Network configuration checklist:

  • MX records are correctly configured
  • Firewalls aren’t blocking authentication checks
  • DNS resolution is working as expected
  • Mail servers are set up for proper authentication

Watch out for these common problems:

  • Misconfigured relay servers
  • Expired certificates
  • Server time synchronization issues
  • Network problems affecting DNS lookups
  • Mail servers are not properly configured for DKIM signing

7. Review third-party sender setup

If you’re like most organizations, you probably have multiple services sending emails on your behalf: marketing tools, help desk software, CRM systems, and more. Each one needs to be properly configured for DMARC to work.

Start by making a complete list:

  • Marketing automation platforms
  • Customer support systems
  • CRM and sales tools
  • Cloud services
  • Development and testing tools
  • Internal applications

For each service, verify:

  • They’re included in your SPF record
  • DKIM is properly configured and using your domain
  • Authentication results are passing in DMARC reports
  • They’re sending from authorized domains/subdomains
  • Proper delegation records are in place

Common third-party issues to fix:

  • Missing SPF includes for new services
  • Incorrect DKIM key deployment
  • Services using their own domains instead of yours
  • Incomplete or incorrect delegation setup
  • Authorization gaps after service changes

8. Monitor policy enforcement

Your DMARC policy could be hurting your campaigns. Too strict and you might block legitimate emails, too loose and you leave security gaps. Here’s how to check if your policy is working as intended:

Verify your current policy settings:

  • Check your p= tag value (none, quarantine, or reject)
  • Confirm your pct= setting is appropriate
  • Review any subdomain policies (sp= tag)
  • Check your reporting settings (rua= and ruf= tags)
  • Verify that the aggregate report addresses are receiving data
how a dmarc policy works

Watch these enforcement indicators:

  • Are receivers respecting your policy?
  • Do failure rates match your expectations?
  • Is your pct= threshold appropriate?
  • Are legitimate emails being affected?
  • Are your subdomains properly protected?

Troubleshooting enforcement problems:

  • Check if specific receivers aren’t following your policy
  • Look for unexpected spikes in DMARC failures
  • Monitor delivery rates to major email providers
  • Track spam folder placement
  • Review feedback loops for delivery issues

Tip: If you’re seeing unexpected results, temporarily adjust your policy (like reducing pct= or switching from reject to quarantine) while you investigate. Just don’t forget to change it back once you’ve fixed the underlying issues.

9. Check for common misconfigurations

Here’s what to check:

DNS record problems:

  • Multiple SPF records (you should only have one)
  • Incorrect record placement
  • Missing underscores in DMARC record name (_dmarc)
  • Forgotten legacy or outdated records
  • Incorrect syntax in TXT records

Subdomain configuration issues:

  • Missing subdomain policies
  • Incorrect inheritance settings
  • Conflicting records between parent and subdomains
  • Forgotten development or test subdomains
  • Missing authentication for wildcarded subdomains

Email routing complications:

  • Forwarding services breaking authentication
  • Incorrectly configured email aliases
  • Missing authentication for internal routes
  • Misconfigured mail gateways
  • Loop detection issues

Service integration problems:

  • Cloud services using wrong sending domains
  • Missing or incorrect delegate domains
  • Authentication gaps in hybrid setups
  • Incomplete service provider configurations
  • Missing authorization records

10. Test and validate fixes

Once you’ve made changes to your DMARC configuration, you need to verify everything’s working correctly. The last thing you want is to assume you’ve fixed the problem only to discover new issues later.

Start by sending test emails through different paths in your email infrastructure. Send messages from your main mail servers, marketing platforms, help desk systems, and any other services that use your domain. Monitor these test messages carefully—both the authentication results and where they land.

Keep a close eye on your DMARC reports for the next few days. You should see authentication pass rates improving and fewer alignment failures. If you spot any unexpected results, address them quickly before they become bigger problems.

Check your spam folder placement across major email providers. Your legitimate emails should be landing in inboxes, not spam folders. If they’re still hitting spam, you might have missed something in your configuration.

Don’t forget to monitor your email delivery metrics. Look for improvements in delivery rates, opens, and clicks. These numbers can tell you if your fixes are actually working in the real world, not just in technical reports.

Focus on your high-priority email streams: the messages your business can’t afford to have fail. Sales communications, customer service responses, and automated alerts should all be flowing smoothly.

Tip: It can take 24-48 hours for DNS changes to fully propagate, so be patient and keep monitoring. If you’ve made multiple changes, you might need several days of monitoring to double-check that everything is stable.

Partner with Valimail to put your DMARC issues behind you

Yes, this DMARC troubleshooting checklist gives you a solid foundation for fixing most DMARC issues, but maintaining email authentication can be complicated and time-consuming. Not to mention, there’s probably a lot of other things you’d rather be doing (aka, anything).

As your organization grows, you’ll add new services, change email providers, and face evolving security challenges. Each change brings new authentication hurdles. Fortunately, we can help.

Valimail’s zero-trust email authentication platform doesn’t just fix your current issues—it prevents future problems from coming up. We handle the complex parts of DMARC management, from automatic third-party sender authorization to real-time monitoring and alerts.

Instead of spending hours manually troubleshooting email authentication, you could:

  • Get complete visibility into your email ecosystem
  • Automate sender management and authorization
  • Receive instant alerts about authentication issues
  • Deploy changes confidently with automated testing
  • Protect your domain from impersonation attacks

Managing your DMARC and going through this DMARC consultation checklist can take months or even years, and when you’re short-staffed, there’s simply no time.

If you’re spinning in circles and want to talk to a DMARC expert for some free advice and help, we’re here for you. Schedule a free consultation with us today.

Talk to a DMARC expert at Valimail for free

Get started for free
with Monitor

Start your path to DMARC enforcement with a panoramic view of the traffic being sent on your behalf.
No trial offers, credit cards, or obligations.

Explore all Valimail
has to offer

Go one step further than visibility…Take action! Reach DMARC enforcement faster. Stay compliant with evolving sender requirements. All while protecting your brand.

[UPCOMING WEBINAR] Valimail Product Release: Get Better Brand Protection and Brand Impressions – Register HERE