All resources
Inbox Pulse

DMARC Record Not Found: What Agencies Should Check Before Recommending a Policy

Learn what “DMARC record not found” means, why agencies should review it, and what to check before recommending p=none, quarantine, or reject.

Updated 17 May 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

"DMARC record not found" usually means there is no visible TXT record at _dmarc.example.com for the domain being checked. Agencies should treat this as a configuration gap to review, not as a complete explanation for deliverability issues, spoofing, or domain-abuse problems.

DMARC is important because it connects SPF and DKIM authentication to the visible From domain and publishes a policy. But a missing DMARC record should not lead to an automatic jump straight to p=reject. Agencies need to confirm legitimate senders, SPF and DKIM alignment, reporting-address ownership, and client risk before recommending a policy. Use Inbox Pulse to check visible email-authentication DNS signals, use the free 10-domain agency audit for a broader domain review, and use the CertPilot methodology to understand how public DNS checks are interpreted.

Quick answer: DMARC record not found

DMARC record not found means a lookup for the DMARC location did not find a visible TXT record beginning with v=DMARC1. For the root domain example.com, the DMARC record should normally be published at:

_dmarc.example.com TXT "v=DMARC1; p=none; rua=mailto:dmarc@example.com"

The finding matters because without DMARC, the domain does not publish a visible policy telling receivers how to handle messages that fail aligned SPF or DKIM checks. It also means the domain may not receive DMARC aggregate reports through a rua address. The next step is sender and alignment review, not blind policy enforcement.

What DMARC does

DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It uses SPF and DKIM results, then checks whether at least one of them aligns with the visible From domain.

In practical agency terms:

  • SPF checks whether the sending server is authorized.
  • DKIM checks whether the message was signed by a valid domain key.
  • DMARC checks whether SPF or DKIM aligns with the domain the recipient sees.
  • DMARC policy tells receivers the domain owner's requested handling for failures.

The DMARC, SPF, and DKIM explainer for agency operations is the best companion if a client needs the simple difference.

Where the DMARC record lives

DMARC records live under the _dmarc label. For example.com, the DNS name is _dmarc.example.com.

Common examples:

_dmarc.example.com TXT "v=DMARC1; p=none; rua=mailto:dmarc@example.com"
_dmarc.example.com TXT "v=DMARC1; p=quarantine; pct=50; rua=mailto:dmarc@example.com"
_dmarc.example.com TXT "v=DMARC1; p=reject; rua=mailto:dmarc@example.com"

If a checker reports no DMARC record, verify the exact domain being checked. A subdomain can inherit policy from the organizational domain in some cases, but agencies should be careful when reviewing subdomain-specific sending. Do not assume the root policy covers every operational question without checking how the client sends.

Why DMARC may be missing

DMARC may be missing because:

  • The client never completed email-authentication setup.
  • The domain predates current Google or Microsoft bulk-sender expectations.
  • The client uses mail platforms but nobody owns DNS hygiene.
  • A previous record was removed during a DNS migration.
  • The client fears that DMARC will break legitimate mail.
  • Nobody owns the reporting mailbox.
  • The domain is not supposed to send email, but that was never documented.

The missing record is a useful signal, but the agency should still confirm the actual mail flow before changing DNS.

DMARC p=none as a monitoring starting point

Many domains start with p=none because it allows the domain owner to publish DMARC and receive aggregate reports without asking receivers to quarantine or reject failing mail. This is often a reasonable starting point when the client has not mapped legitimate senders yet.

Example:

v=DMARC1; p=none; rua=mailto:dmarc@example.com

p=none is not the final destination for every domain, and it is not an enforcement policy. It is a visibility and monitoring posture. Agencies should explain this clearly: it helps start the review process, but raw reports still need processing and interpretation.

For policy progression, use the DMARC policy guide for none, quarantine, and reject.

Why agencies should not jump straight to p=reject

p=reject can be appropriate for some domains after legitimate senders are aligned and monitored. It is not automatically the right first step for every client.

Jumping straight to enforcement can create problems when:

  • A CRM sends as the client domain but is not DKIM-aligned.
  • A website form sends through a generic SMTP server.
  • A billing or ecommerce platform sends transactional mail.
  • A regional office or legacy system still sends from the domain.
  • SPF passes for one sender but DKIM is missing for another.
  • Nobody is watching DMARC reports.

The agency should first identify legitimate senders and confirm alignment. Then policy can be tightened deliberately.

SPF/DKIM alignment before enforcement

DMARC enforcement depends on alignment. A message can pass SPF and still fail DMARC if the SPF-authenticated domain does not align with the visible From domain. A message can pass DKIM for a vendor domain but fail DMARC if the signing domain is not aligned.

Before enforcement, ask:

  • Which systems send as the client domain?
  • Does each sender use aligned DKIM?
  • Does SPF align for any sender that depends on SPF?
  • Are third-party senders using the client's domain or their own?
  • Are subdomains handled intentionally?
  • Can the client test real messages from every platform?

The DKIM record not found guide and SPF record review guides help identify related issues.

RUA reporting address decisions

The rua tag tells supporting receivers where to send aggregate DMARC reports. It is a reporting destination, not an enforcement mechanism.

Agencies should decide:

  • Who owns the mailbox or platform receiving reports?
  • Is the address on the same domain or an external reporting service?
  • If external, has the destination been authorized where required?
  • Who reviews reports and turns them into action?
  • Is the client expecting a DMARC monitoring platform?

If nobody will process reports, a rua address alone may create noise rather than operational value. The DMARC RUA and RUF guide gives a deeper workflow for reporting tags.

DMARC missing-record review checklist

Use this checklist before recommending a DMARC policy:

  • [ ] Confirm the checked domain and _dmarc DNS name.
  • [ ] Confirm whether the domain sends email.
  • [ ] List employee, marketing, transactional, CRM, helpdesk, and website-form senders.
  • [ ] Check SPF presence and basic sender coverage.
  • [ ] Check DKIM selectors for active platforms.
  • [ ] Confirm whether each important sender aligns with the visible From domain.
  • [ ] Decide whether p=none is the right starting posture.
  • [ ] Choose a reporting address owner before adding rua.
  • [ ] Avoid p=quarantine or p=reject until legitimate senders are reviewed.
  • [ ] Document the policy owner and review cadence.

DMARC states agencies commonly find

| DMARC state | Plain-English meaning | Agency action | Caution | |---|---|---|---| | No record | No visible DMARC policy at _dmarc | Review sender inventory and consider starting with p=none | Do not assume this explains every delivery issue | | p=none | Monitoring posture | Confirm reports are received and reviewed | It does not enforce handling | | p=quarantine | Receiver is asked to treat failing mail suspiciously | Confirm all legitimate senders are aligned | Can affect real mail if setup is incomplete | | p=reject | Receiver is asked to reject failing mail | Use only after alignment and monitoring review | Not always the right first policy | | Record exists but no rua | Policy exists without aggregate reporting | Decide whether reporting is needed | Without reports, visibility is limited | | Syntax or lookup issue | Record may be malformed or not visible | Fix DNS syntax and retest | Small syntax errors can change behavior |

What Inbox Pulse can check

Inbox Pulse can check visible DNS/email-authentication configuration signals, including whether a DMARC TXT record appears to exist at the expected _dmarc location and what broad policy posture is visible. It can also surface related public signals such as SPF, MX, MTA-STS, TLS-RPT, and BIMI where supported.

It does not process DMARC aggregate XML reports, replace DMARC monitoring platforms, read inboxes, send test emails, change DNS records, or guarantee deliverability. Use it for configuration QA and triage, then combine the result with DNS access, mail-platform settings, message-header checks, and a DMARC reporting workflow where needed.

What a missing DMARC record does not prove

A missing DMARC record does not prove:

  • The client has no email authentication at all.
  • Every legitimate message is failing.
  • Spoofed messages are reaching inboxes.
  • A strict policy should be published immediately.
  • Inbox placement will improve after adding one record.
  • Aggregate reporting is already configured elsewhere.

It proves only that the expected public DMARC TXT record was not visible at the checked location.

Frequently Asked Questions

What does DMARC record not found mean?

DMARC record not found means the checker did not find a visible TXT record beginning with v=DMARC1 at the expected _dmarc location for the domain. For example.com, that location is _dmarc.example.com. The result identifies a configuration gap, but it does not prove that every email message is failing or that a strict policy should be added immediately.

Should agencies recommend p=none first?

Often, yes, especially when the client has not inventoried legitimate senders or reviewed alignment. p=none can provide a monitoring starting point without asking receivers to quarantine or reject failing messages. It is not enforcement, and it still requires a reporting workflow if rua is used. For some mature domains, a stricter policy may already be appropriate, but that should be based on evidence.

Is p=reject always the best DMARC policy?

No. p=reject is not always the best first policy. It can be useful after legitimate senders are aligned and monitored, but it can disrupt real client email if applied too early. Agencies should review SPF, DKIM, subdomains, third-party platforms, and reporting before recommending enforcement. The right policy depends on the client's current mail flows and risk tolerance.

Can a domain pass DMARC without SPF?

Yes, a message can pass DMARC through aligned DKIM even if SPF is missing or not aligned for that message. DMARC requires aligned SPF or aligned DKIM, not necessarily both. That said, agencies should still review SPF because many client domains use multiple sending systems, and some flows may rely on SPF more than others.

Does Inbox Pulse process DMARC aggregate reports?

No. Inbox Pulse checks visible public DNS/email-authentication configuration signals. It does not process DMARC aggregate XML reports, run a DMARC monitoring inbox, or replace platforms built for report analysis. If a client needs source-by-source DMARC reporting over time, use a dedicated DMARC monitoring platform alongside configuration checks.

Can adding DMARC fix deliverability?

Adding DMARC can improve authentication posture, but it does not guarantee deliverability or inbox placement. Deliverability depends on many factors, including sender reputation, complaint rates, list quality, content, bounce handling, platform configuration, and mailbox-provider behavior. Agencies should present DMARC as part of responsible email-domain configuration, not as a one-record deliverability fix.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.