DMARC Policy Explained: None vs Quarantine vs Reject
Understand the three DMARC policies (p=none, p=quarantine, p=reject) and learn when to use each one for optimal email security and deliverability.

Introduction
Setting up DMARC is more than just adding a DNS record—the policy you choose determines how strictly your domain is protected. Choose too aggressively and legitimate emails might be blocked. Choose too conservatively and attackers can still spoof your domain.
This guide explains the three DMARC policies (p=none, p=quarantine, p=reject), when to use each one, and how to safely transition between them.
What is a DMARC Policy?
A DMARC policy tells email receivers what to do with emails that fail DMARC authentication. It's the enforcement mechanism that makes DMARC effective.
Think of it like security instructions for a building:
- p=none: "Record who enters but let everyone through" (monitoring)
- p=quarantine: "Escort unauthorized visitors to a waiting area" (send to spam)
- p=reject: "Turn unauthorized visitors away at the door" (block completely)
The policy appears in your DMARC DNS record:
v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.comThe p= tag specifies your policy.
The Three DMARC Policies
Policy 1: p=none (Monitor Mode)
What it does:
- Allows all emails through, even if they fail DMARC
- Email providers send you reports about authentication results
- No impact on email delivery
DMARC record example:
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.comWhen to use it:
✅ Initial DMARC implementation
- First 2-4 weeks of DMARC setup
- Learning what legitimate sources send from your domain
- Identifying authentication issues
✅ After major infrastructure changes
- New email service provider
- New marketing automation platform
- After merger/acquisition
✅ Ongoing monitoring for complex environments
- Many third-party senders
- Multiple business units
- Frequent changes to email infrastructure
Benefits:
- Zero risk to email delivery
- Complete visibility into email ecosystem
- Identifies all senders using your domain
- Detects spoofing attempts (but doesn't block them)
Limitations:
- Provides no protection against spoofing
- Attackers can still impersonate your domain
- Doesn't improve deliverability
Real-world example:
A retail company implemented p=none and discovered:
- Their e-commerce platform wasn't DKIM-signed
- Marketing emails from Mailchimp had SPF issues
- An old support ticketing system was still sending
- Several phishing attempts were using their domain
They fixed the legitimate issues before moving to enforcement, preventing delivery problems.
Policy 2: p=quarantine (Soft Enforcement)
What it does:
- Sends failing emails to spam/junk folder
- Legitimate emails still delivered (but in spam)
- Reports continue to be sent
DMARC record example:
v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.comWhen to use it:
✅ Transition phase between p=none and p=reject
- After fixing all known authentication issues
- Before full enforcement
- 2-4 weeks of testing
✅ Conservative protection for complex environments
- Many legitimate senders that occasionally have issues
- High volume of email with varying sources
- When
p=rejectfeels too risky
✅ Subdomain protection with different risk profiles
- Main domain at
p=reject - Subdomains at
p=quarantine
v=DMARC1; p=reject; sp=quarantine; rua=mailto:dmarc@yourdomain.comBenefits:
- Provides real protection without blocking
- Failed emails are still accessible (in spam)
- Less risk than immediate rejection
- Significantly reduces phishing success rate
Limitations:
- Doesn't completely block spoofed emails
- Some recipients check spam folders
- Not as strong as
p=rejectfor brand protection
Important consideration:
Different email providers interpret "quarantine" differently:
- Gmail: Usually sends to spam folder
- Outlook: May send to junk or block entirely
- Others: Varies by provider
This means p=quarantine doesn't guarantee delivery to spam—some providers may still reject.
Policy 3: p=reject (Full Enforcement)
What it does:
- Blocks failing emails completely
- They never reach the recipient's inbox or spam folder
- Maximum protection for your domain
DMARC record example:
v=DMARC1; p=reject; rua=mailto:dmarc-reports@yourdomain.comWhen to use it:
✅ After successful monitoring and quarantine phases
- All legitimate senders authenticated properly
- No authentication issues in reports for 2+ weeks
- Confident in your configuration
✅ Maximum brand protection
- High-profile brands targeted by phishing
- Financial institutions
- Healthcare organizations
- Government agencies
✅ Compliance requirements
- Industry regulations requiring strong authentication
- Security certifications
- Customer contracts mandating protection
Benefits:
- Complete protection from domain spoofing
- Strongest possible brand protection
- Prevents phishing emails from reaching targets
- Meets strictest compliance requirements
- Improves deliverability of legitimate email
Risks:
- Misconfigured legitimate email will be blocked
- No "undo" button—rejected emails are gone
- Requires ongoing monitoring to catch new issues
Critical requirements before using p=reject:
❗ All legitimate email sources must:
- Have valid SPF or DKIM authentication
- Pass DMARC alignment (From domain matches authenticated domain)
- Be thoroughly tested
- Be monitored continuously
Real-world example:
A financial services company moved to p=reject after 8 weeks of preparation:
- Week 1-4:
p=nonemonitoring - Week 5-8:
p=quarantinetesting - Week 9+:
p=rejectenforcement
Result: Phishing attempts using their domain dropped to zero, and their legitimate email deliverability actually improved by 15% due to better sender reputation.
Policy Comparison Table
| Feature | p=none | p=quarantine | p=reject |
|---|---|---|---|
| Protection Level | None | Moderate | Maximum |
| Failed Emails | Delivered | Spam folder | Blocked |
| Risk to Legitimate Email | None | Low | Medium |
| Brand Protection | None | Good | Excellent |
| Recommended Duration | 2-4 weeks | 2-4 weeks | Ongoing |
| Reports Sent | Yes | Yes | Yes |
| Compliance Level | Minimal | Good | Excellent |
| Phishing Prevention | 0% | 70-80% | 95-99% |
Advanced Policy Options
Percentage-Based Enforcement (pct)
Apply your policy to only a percentage of failing emails:
v=DMARC1; p=reject; pct=25; rua=mailto:dmarc@yourdomain.comThis means:
- 25% of failing emails are rejected
- 75% are handled as if policy was
p=none
Use cases:
- Gradual rollout of
p=quarantineorp=reject - Testing impact before full enforcement
- Very large email volumes where caution is needed
Typical progression:
p=reject; pct=10for 1 week (test with small subset)p=reject; pct=25for 1 weekp=reject; pct=50for 1 weekp=reject; pct=100(or justp=reject)
Subdomain Policy (sp)
Set different policies for your main domain vs subdomains:
v=DMARC1; p=reject; sp=quarantine; rua=mailto:dmarc@yourdomain.comp=reject: Policy foryourdomain.comsp=quarantine: Policy forsubdomain.yourdomain.com
Common patterns:
Pattern 1: Strict main domain, lenient subdomains
v=DMARC1; p=reject; sp=none; rua=mailto:dmarc@yourdomain.com- Main domain fully protected
- Subdomains in monitoring mode
Pattern 2: Protect all, different levels
v=DMARC1; p=reject; sp=quarantine; rua=mailto:dmarc@yourdomain.com- Main domain: maximum protection
- Subdomains: moderate protection
Use case example:
yourdomain.com → p=reject (customer-facing)
marketing.yourdomain.com → p=quarantine (many third parties)
test.yourdomain.com → p=none (testing environment)Each subdomain can have its own DMARC record, or inherit from the parent domain's sp policy.
Policy Progression: The Safe Path
Phase 1: Monitoring (2-4 weeks)
Policy: p=none
Actions:
- Publish initial DMARC record
- Set up report collection
- Analyze daily reports
- Identify all email sources
- Document authentication issues
Success criteria:
- Receiving reports from major providers
- Identified all legitimate senders
- SPF and DKIM authentication working for all legitimate sources
Phase 2: Soft Enforcement (2-4 weeks)
Policy: p=quarantine
Actions:
- Update policy to
p=quarantine - Monitor reports for unexpected failures
- Watch for delivery complaints
- Fix any newly discovered issues
Success criteria:
- No legitimate email complaints
- DMARC pass rate >95%
- All critical senders authenticated
Phase 3: Full Enforcement (Ongoing)
Policy: p=reject
Actions:
- Update policy to
p=reject - Continue monitoring reports
- Set up alerts for new failures
- Maintain ongoing vigilance
Success criteria:
- DMARC pass rate >98%
- Zero legitimate email blocked
- Continuous monitoring in place
Common Mistakes to Avoid
Mistake 1: Jumping Directly to p=reject
❌ Wrong:
Day 1: Set p=reject without any monitoringThis will likely block legitimate emails you didn't know about.
✅ Right:
Week 1-4: p=none (monitor)
Week 5-8: p=quarantine (test)
Week 9+: p=reject (enforce)Mistake 2: Staying on p=none Forever
Some organizations set p=none and never move forward. While this provides visibility, it offers zero protection.
Balance: Move to enforcement when you're confident, but don't rush.
Mistake 3: Not Monitoring After p=reject
Even with p=reject, you must continue monitoring reports:
- New services might be added
- Configuration changes can break authentication
- Attackers still attempt spoofing
Set up automated alerts for:
- Compliance drops below threshold
- New failing sources or IP addresses
- Volume spikes in email traffic
- DNS record changes (DMARC, SPF, DKIM)
Mistake 4: Forgetting About Subdomains
If you only set a DMARC record on your main domain, subdomains are unprotected unless you set the sp tag.
❌ Vulnerable:
yourdomain.com has DMARC
subdomain.yourdomain.com has no DMARC and no sp tag
→ Attackers can spoof subdomain.yourdomain.com✅ Protected:
v=DMARC1; p=reject; sp=reject; rua=mailto:dmarc@yourdomain.comChoosing the Right Policy for Your Organization
Start with p=none if:
- You've never implemented DMARC
- You don't know all your email sources
- You're unsure about current authentication status
- You have a complex email infrastructure
Move to p=quarantine if:
- You've monitored for 2-4 weeks
- All legitimate sources are authenticated
- You want gradual protection
- You have a conservative risk tolerance
Advance to p=reject if:
- You've successfully completed quarantine phase
- DMARC pass rate is consistently >95%
- You need maximum protection
- Compliance requires it
- You're ready for ongoing monitoring
Monitoring Your Policy
Key Metrics to Track
DMARC Pass Rate:
Pass Rate = (Passing Emails / Total Emails) × 100- Target: >95% before moving to quarantine
- Target: >98% before moving to reject
Compliance Rate:
Compliance Rate = (Compliant Volume / Total Volume) × 100Source Authentication:
- Which sources pass consistently
- Which sources fail occasionally
- New sources appearing
Tools for Monitoring
Free checking:
- DMARC Checker - Verify current policy
- Domain Score - Overall email security
- Google Postmaster Tools - Gmail-specific data
Automated monitoring:
- DMARC report aggregation
- Real-time alerts
- Trend analysis
- Start free trial
The Bottom Line
DMARC policies are not one-size-fits-all, and the right policy depends on your organization's stage and needs:
p=none: Essential first step for visibility p=quarantine: Safe middle ground for testing p=reject: Maximum protection for ready organizations
Key takeaways:
- Always start with p=none to understand your email ecosystem
- Monitor for 2-4 weeks before advancing to the next policy
- p=quarantine is a safe testing ground before full enforcement
- p=reject provides maximum protection but requires preparation
- Continue monitoring even after reaching p=reject
- Don't forget subdomains - use the sp tag
The journey from p=none to p=reject typically takes 6-12 weeks, but the protection is worth the careful progression.
Next Steps
Ready to implement or upgrade your DMARC policy?
- Check your current policy: DMARC Checker
- Verify your authentication: Domain Score
- Get policy recommendations: Start free trial for automated analysis
Need help deciding which policy is right for you? Our platform analyzes your DMARC reports and recommends the optimal policy based on your authentication success rate.
Related Articles:
Ready to improve your email deliverability?
Start monitoring your DMARC reports and get insights into your email authentication setup.
Start Free TrialRelated Articles
How to Read DMARC XML Reports (With Examples)
Learn how to read and understand DMARC XML aggregate reports. Annotated examples showing report metadata, policy, auth results, and how to spot problems.
getting startedSPF, DKIM, and DMARC: The Complete Email Authentication Guide
Master email authentication with this comprehensive guide to SPF, DKIM, and DMARC. Learn how these protocols work together to secure your email delivery.
getting startedWhat is DMARC? A Simple Guide for Non-Technical People
Learn what DMARC is and why it matters for your email security in plain English. No technical jargon required.