DMARC RUA and RUF Explained for Agencies Managing Client Domains
Learn what DMARC rua and ruf tags mean, how agencies should think about reporting addresses, and why raw reports need the right review workflow.
Updated 17 May 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
DMARC rua points to aggregate report destinations, while ruf is intended for failure or forensic reporting where supported. Agencies should treat these tags as reporting configuration, not as enforcement by themselves. They help define where reports may be sent; they do not decide whether mail passes, guarantee inbox placement, or replace a DMARC monitoring workflow.
Use Inbox Pulse to check visible public DMARC DNS configuration, including whether reporting tags are present in the record. Use the free 10-domain agency audit when email DNS should be reviewed alongside broader client-domain health. Review the CertPilot methodology when explaining that CertPilot checks public records and does not process private mailbox or DMARC aggregate-report data.
Quick answer: DMARC rua and ruf
rua means "reporting URI for aggregate reports." It usually points to one or more mailto: destinations that can receive aggregate DMARC reports from supporting receivers.
ruf means "reporting URI for forensic reports." It is intended for more detailed failure reports where supported, but many receivers do not send them, and privacy considerations are stronger.
Example:
v=DMARC1; p=none; rua=mailto:dmarc-aggregate@example.com; ruf=mailto:dmarc-failures@example.com
The important agency point: these tags route reports. They do not enforce DMARC policy. Enforcement comes from the p= policy and receiver behavior after SPF/DKIM alignment checks.
What rua means
The rua tag identifies where aggregate DMARC reports should be sent. Aggregate reports are machine-readable summaries, often XML, that describe mail sources seen by participating receivers.
They may help answer:
- Which IPs or services are sending mail using the client's domain?
- Which sources pass or fail SPF?
- Which sources pass or fail DKIM?
- Which sources align with the visible From domain?
- How much mail is being observed by a receiver?
For agencies, rua is useful only if someone or some platform can process the reports. A mailbox full of XML attachments is not a monitoring system by itself.
What ruf means
The ruf tag identifies where forensic or failure reports may be sent. These reports are intended to provide more detailed information about individual authentication failures. In practice, support varies, and privacy concerns limit use.
Agencies should be careful with ruf because failure reports may expose more sensitive message-level details than aggregate reports. Before adding it, clarify:
- Does the client actually need forensic reports?
- Who will receive them?
- Can the recipient handle privacy obligations?
- Does the target mailbox provider send useful
rufreports? - Is a DMARC platform better suited to handle the workflow?
Many domains start with rua only.
Aggregate reports vs forensic reports
| Tag | Purpose | Common value | Agency note |
|---|---|---|---|
| rua | Destination for aggregate reports | mailto:dmarc@example.com | Useful for source visibility when processed properly |
| ruf | Destination for forensic or failure reports | mailto:dmarc-failures@example.com | Less commonly useful; stronger privacy review needed |
| p | Requested policy for failed DMARC | none, quarantine, or reject | Policy controls requested handling, not reporting destination |
| pct | Percentage of mail subject to policy | pct=50 | Used during gradual rollout |
| fo | Failure-reporting options | fo=1 or similar | Relevant only where forensic reporting is supported |
Aggregate reports are the normal operational starting point. Forensic reports are more specialized and should not be added casually.
Why many domains start with rua only
Many domains start with a DMARC record like:
v=DMARC1; p=none; rua=mailto:dmarc@example.com
That gives the client a monitoring starting point without asking receivers to quarantine or reject mail. It also avoids the additional privacy and operational complexity of forensic reporting.
For an agency, this is often the safest path when:
- The client has multiple senders.
- Sender ownership is unclear.
- The domain has not previously monitored DMARC.
- Nobody has reviewed SPF/DKIM alignment.
- The client does not have a DMARC reporting platform yet.
Use the DMARC record not found guide when a domain has no record at all.
Reporting address ownership
Reporting address ownership is easy to overlook. The address in rua or ruf should belong to a team or platform that will actually process the reports.
Agencies should avoid sending reports to:
- A personal employee mailbox.
- An unmonitored support inbox.
- A developer's address that will be abandoned later.
- A mailbox that cannot handle volume.
- An external domain that has not been authorized where required.
If the reporting address uses an external DMARC provider, make sure the provider's authorization instructions are followed. DMARC report destinations can involve cross-domain authorization requirements.
Privacy and operational considerations
DMARC reports can contain operationally sensitive information. Aggregate reports are summarized, but they still reveal sending sources and authentication results. Forensic reports can be more sensitive because they may contain message-level failure details depending on sender and receiver behavior.
Before configuring reporting, ask:
- Does the client approve where reports are sent?
- Is the destination mailbox or vendor appropriate for client data?
- Who can access the reports?
- How long are reports retained?
- Is there a data-processing agreement if a third-party platform is used?
- Does the agency have authority to receive reports for the client?
For routine agency operations, a dedicated DMARC platform may be cleaner than raw mailbox handling.
Why raw DMARC reports need processing
Raw DMARC aggregate reports are not designed for casual reading. They are often compressed XML files from many receivers. A client or agency can technically receive them in a mailbox, but turning them into decisions requires parsing, grouping, source identification, and trend review.
Without processing, agencies may struggle to answer:
- Is this source legitimate?
- Is this a forwarded message pattern?
- Is this a vendor that needs DKIM setup?
- Is this spoofing, or just a misaligned platform?
- Is it safe to move from
p=noneto enforcement?
This is why rua is configuration, not the whole DMARC program.
When to use a DMARC monitoring platform
Use a dedicated DMARC monitoring platform when the client needs:
- Ongoing aggregate report processing.
- Source identification.
- Policy progression planning.
- Multi-domain portfolio reporting.
- Alerts when new senders appear.
- Evidence before moving to
p=quarantineorp=reject. - Operational dashboards for compliance or security teams.
Inbox Pulse is useful for checking whether the public DNS configuration exists. It is not a replacement for a platform that processes aggregate reports over time.
DMARC reporting-address review checklist
Before adding or changing rua or ruf, check:
- [ ] Does the domain already publish a DMARC record?
- [ ] Is the DMARC policy appropriate for the client's current sender alignment?
- [ ] Is
ruapresent? - [ ] Who owns the
ruadestination? - [ ] Can the destination process XML aggregate reports?
- [ ] Is the destination on the same domain or an external provider?
- [ ] If external, has authorization been configured where required?
- [ ] Is
rufgenuinely needed? - [ ] Has privacy review been completed for forensic reports?
- [ ] Is there a cadence for reviewing report findings?
What Inbox Pulse can check
Inbox Pulse can check visible DNS configuration in the DMARC TXT record, including whether reporting tags such as rua or ruf appear in the public record. It can help agencies spot missing or unusual reporting configuration during DNS QA.
Inbox Pulse does not process DMARC aggregate XML reports, receive reports on behalf of clients, classify sending sources from report history, read inboxes, send test emails, or replace enterprise DMARC platforms. Treat it as a configuration auditor.
What Inbox Pulse does not process
Inbox Pulse does not process:
- DMARC aggregate XML reports sent to
rua. - Forensic or failure reports sent to
ruf. - Inbox placement tests.
- Message headers from live mailboxes.
- Mailbox-provider reputation dashboards.
- Historical deliverability trends.
That distinction matters. A public DNS check can tell you what the domain asks receivers to do with reports. It cannot tell you what all receivers have reported over time.
Related Resources
- DMARC record not found for agencies
- DMARC policy: none, quarantine, and reject
- Bulk DMARC checks for client domains
- DMARC, SPF, and DKIM explained for agency operations
- Google bulk sender DMARC guide for agencies
Frequently Asked Questions
What does DMARC rua mean?
DMARC rua means the domain is publishing one or more destinations for aggregate reports. These reports summarize authentication results observed by participating receivers. The common format is rua=mailto:dmarc@example.com. The tag does not enforce policy by itself; it only tells receivers where aggregate reports should be sent.
What does DMARC ruf mean?
DMARC ruf means the domain is publishing a destination for forensic or failure reports where supported. These reports can be more detailed and may raise privacy considerations. Many domains do not use ruf, and many receivers do not send useful forensic reports. Agencies should not add it casually without knowing who will receive and handle the data.
Is rua required for DMARC?
No, a DMARC record can exist without rua, but without aggregate reports the client has less visibility into sending sources and authentication results. For domains that plan to progress toward stricter policy, rua is often useful. The value depends on whether someone can process and act on the reports.
Can Inbox Pulse process DMARC RUA reports?
No. Inbox Pulse can check visible public DMARC DNS configuration, including whether a rua tag appears. It does not process DMARC aggregate XML reports, receive reports, or provide historical source classification. Use a dedicated DMARC monitoring platform when the client needs ongoing aggregate-report analysis.
Should agencies use ruf for every client?
No. ruf should not be used automatically for every client. It can create privacy and operational questions, and support is inconsistent. Many client domains should start with rua only, especially when the first goal is to understand legitimate sending sources through aggregate reporting.
Do rua and ruf enforce DMARC?
No. rua and ruf are reporting tags. They do not enforce DMARC policy, reject messages, quarantine mail, or improve inbox placement by themselves. Enforcement posture is controlled by the p= policy and receiver behavior after DMARC alignment checks.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.