All resources
Inbox Pulse

Google Bulk Sender DMARC Requirements: What Agencies Need to Check

Agency checklist for Google-style bulk sender DMARC, SPF, DKIM, alignment, unsubscribe, and client email-domain readiness.

Updated 30 April 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

The Google bulk sender DMARC agency checklist is about repeatability. Agencies managing client email domains need to confirm that DMARC exists, SPF and DKIM are configured, authentication aligns with the visible From domain, and unsubscribe expectations are understood before campaigns or high-volume sending create pressure.

This is not a legal guarantee, compliance certificate, or inbox-placement promise. Google and Yahoo-style sender requirements are operational signals that agencies should fold into onboarding and review workflows. The safest agency posture is to check public configuration, verify real senders, document gaps, and escalate specialized deliverability work when needed.

CertPilot's Inbox Pulse helps agencies audit DMARC, SPF, DKIM-related configuration risk, MTA-STS, TLS-RPT, and BIMI across multiple domains. It is useful before onboarding, quarterly reviews, and client deliverability complaints. It does not replace full DMARC RUA monitoring platforms.

Need a broader SSL, DNS, and domain expiry view? Run a free 10-domain agency audit, or use the full free tools list at /tools.

Google bulk sender DMARC agency checklist

Use this practical checklist for agency-managed domains:

| Area | What to check | Agency note | |---|---|---| | DMARC | Record exists at _dmarc.domain | Missing DMARC should be a priority review item. | | DMARC policy | p=none, quarantine, or reject | Do not jump policies without verifying senders. | | SPF | One valid SPF record | Watch for old includes and lookup-limit risk. | | DKIM | Active DKIM for each sender | Verify selectors in provider dashboards and headers. | | Alignment | SPF or DKIM aligns with visible From | DMARC depends on aligned authentication. | | Unsubscribe | Marketing mail supports required unsubscribe behavior | Usually handled in the email platform, not DNS. | | Sender inventory | List all platforms that send mail | Prevents accidental breakage during policy changes. |

This table should be part of a client onboarding template, not a one-off emergency exercise.

What agencies should avoid promising

Bulk sender rules can sound like a simple checklist, but agencies should keep the wording careful.

Avoid promising:

  • guaranteed Gmail inbox placement
  • guaranteed deliverability
  • legal or compliance certification
  • that DMARC alone fixes all mail issues
  • that CertPilot replaces dedicated deliverability or DMARC monitoring platforms

Promise the practical work instead: configuration review, sender inventory, DNS cleanup, and clear next actions.

DMARC exists, but what policy?

DMARC policy tells receivers what the domain asks them to do with mail that fails DMARC.

The common values are:

  • p=none
  • p=quarantine
  • p=reject

For agencies, p=none is not automatically wrong. It can be appropriate while identifying legitimate senders. But if the client is a regular sender and has no plan to move beyond monitoring mode, it is a finding.

quarantine and reject are stronger, but they require more confidence. If the client's CRM, ecommerce system, or marketing platform is not aligned, moving too aggressively can affect legitimate mail.

That is why a domain-level check should lead into a sender inventory. A DNS record does not reveal every business process behind email.

SPF and DKIM are not interchangeable

SPF and DKIM prove different things.

SPF checks whether the connecting sender is authorized by a domain used in the return path. DKIM checks whether the message was signed with a private key matching a public key in DNS.

DMARC then asks whether either SPF or DKIM passes and aligns with the visible From domain.

For an agency, the alignment point is where mistakes happen. A vendor can pass SPF for its own return-path domain while the client still fails DMARC alignment. A sender can sign with a vendor domain rather than the client's domain.

During audits, ask:

  • Does the sender authenticate?
  • Does the authentication align with the client domain?
  • Which visible From domain does the client use?
  • Are test messages passing DMARC at major receivers?

Inbox Pulse gives a fast configuration view. For high-volume senders, validate with real campaign or transactional test messages too.

The unsubscribe expectation

Bulk sender requirements often include unsubscribe behavior for commercial or subscribed mail. This is usually managed inside the email platform, not through DNS.

Agencies should check:

  • Does the marketing platform support one-click unsubscribe where required?
  • Is the unsubscribe link visible and working?
  • Is the sending domain aligned with the platform setup?
  • Are clients using personal mailbox tools for bulk outreach?
  • Are suppression lists respected?

CertPilot does not audit unsubscribe implementation. This belongs in the agency's campaign operations checklist, alongside DMARC, SPF, and DKIM configuration.

A practical pre-send review

Before a large client send, agencies should run a short pre-send review instead of relying on memory from the last campaign.

| Review item | Owner | Evidence to collect | |---|---|---| | Sending domain confirmed | Account or email lead | Campaign settings show the intended From domain. | | SPF reviewed | Technical lead | SPF record has no obvious stale vendors or duplicate records. | | DKIM verified | Technical lead | Provider dashboard and test message show DKIM passing. | | DMARC present | Technical lead | _dmarc record exists and policy is understood. | | Alignment checked | Technical lead | Test message authentication results align with the From domain. | | Unsubscribe checked | Campaign owner | Test email includes expected unsubscribe behavior. | | Client signoff | Account owner | Client confirms sender list and campaign scope. |

This does not need to become a heavy compliance process. It is a practical handoff between account, campaign, and technical teams.

Why agencies need a repeatable process

Email authentication becomes risky when every client gets a different process. One project manager checks DNS. Another relies on the client's vendor. A developer adds records during launch week. Nobody documents the sender list.

A repeatable process helps because:

  • onboarding is consistent
  • vendor migrations are easier
  • quarterly reviews have evidence
  • support tickets can be triaged faster
  • clients see a clear maintenance workflow

Use Inbox Pulse to start the configuration review across many domains. Use the agency audit to add SSL, DNS, and domain expiry context. If SSL renewal readiness is also part of the review, use 47-Day Renewal Pre-Flight. For SSL calendar visibility, use Watchtower.

Client sender inventory framework

Before changing policy, complete this lightweight inventory.

| Sender category | Example systems | Questions to ask | |---|---|---| | Employee mail | Google Workspace, Microsoft 365 | Which domains do staff send from? | | Marketing | Mailchimp, Klaviyo, HubSpot | Is DKIM configured and aligned? | | Transactional | SendGrid, Mailgun, SES, Postmark | Which app sends these messages? | | Ecommerce | Shopify, WooCommerce, custom stores | Do receipts use the client domain? | | Support | Zendesk, Help Scout, Intercom | Are reply domains authenticated? | | Finance | invoicing and billing platforms | Are invoices sent as the client domain? | | Website | form plugins, CMS email, hosting mail | Is this still needed or should it route through SMTP? |

This framework prevents the classic failure where SPF and DKIM are "fixed" for the main mailbox but not for the systems that customers actually receive.

How to prioritize fixes

Not every finding has equal urgency.

Start here:

  1. Domains actively used for customer-facing email.
  2. Missing DMARC on active sending domains.
  3. Senders with no DKIM alignment.
  4. SPF records near the lookup limit or full of stale vendors.
  5. p=none domains with no monitoring or rollout plan.
  6. Marketing senders missing unsubscribe process checks.
  7. Parked or defensive domains that may need a simpler protective posture.

This order keeps effort tied to client impact.

What to do with parked and defensive domains

Many clients own domains that do not actively send email. They may be parked domains, campaign domains, typo domains, old brand domains, or domains bought for defensive reasons.

These domains still deserve review because attackers can abuse lookalike or unused domains if policy is weak. The correct action depends on the client's risk tolerance and whether the domain might be used later.

For a simple agency process:

  • Mark whether the domain actively sends mail.
  • If it does not send, document that status.
  • Consider a restrictive posture only after confirming no legitimate sending exists.
  • Recheck before the client uses the domain for a campaign or product launch.

Avoid applying one universal policy across every domain without checking intended use. A quiet domain today may become an important launch domain next quarter.

How Inbox Pulse supports quarterly reviews

Quarterly reviews are a good place for Inbox Pulse because they do not require continuous monitoring claims. The agency can paste the client domain list, identify configuration drift, and compare findings with the client sender inventory.

The output can become a short client note:

  • domains checked
  • missing DMARC records
  • weak or unclear policies
  • SPF records needing cleanup
  • DKIM sender verification needed
  • optional MTA-STS, TLS-RPT, or BIMI opportunities

That is enough to create useful tickets without pretending a DNS audit can diagnose every deliverability issue.

How to communicate findings to clients

Good agency reporting is direct and careful.

Weak wording:

"Your email deliverability is fixed."

Better wording:

"We found and reviewed email-authentication configuration across your sending domains. The main domain publishes DMARC, SPF is present, and Google Workspace DKIM appears configured. The marketing platform still needs DKIM verification before considering a stricter DMARC policy."

This avoids overclaiming while still showing the agency did useful work.

For monthly infrastructure reporting, see the client website health report template. For DNS process issues, see the DNS drift agency guide.

Where Inbox Pulse fits in the stack

Inbox Pulse is for visible configuration risk across multiple domains. It is useful when the agency needs a quick audit before deeper work.

It does not:

  • ingest ongoing DMARC RUA reports
  • provide deliverability consulting
  • guarantee inbox placement
  • manage unsubscribe workflows
  • replace Google Postmaster Tools or specialist email platforms

It does:

  • help identify missing or weak records
  • show which domains need attention
  • support onboarding and quarterly reviews
  • complement broader CertPilot SSL, DNS, and domain checks

Frequently Asked Questions

What should agencies check for Google bulk sender readiness?

Check DMARC, SPF, DKIM, alignment, sender inventory, and unsubscribe behavior for marketing mail. Also verify real messages from the platforms the client actually uses.

Is p=reject required for every client?

No. Policy decisions depend on the client's sender inventory and rollout maturity. Moving too quickly can affect legitimate mail if senders are not aligned.

Does Inbox Pulse guarantee Gmail inbox placement?

No. Inbox Pulse audits configuration risk. Inbox placement depends on authentication, sender reputation, content, engagement, list quality, and other factors.

Should agencies use a DMARC monitoring platform too?

Use one when the client needs continuous DMARC RUA report aggregation and analysis. Inbox Pulse is for bulk configuration auditing, not ongoing report ingestion.

What should I run first?

Run Inbox Pulse for email-authentication risk, then run Audit 10 Domains for broader SSL, DNS, and domain expiry checks.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.