SlideShare a Scribd company logo
1 of 12
Download to read offline
The essential guide to
DMARC
Introduction
to DMARC:
DMARC, Domain-based Message Authentication Reporting and Conformance, is an
email security framework introduced in 2014.
It is a reporting mechanism built upon two existing public DNS records, SPF and DKIM.
Furthermore, it enables recipients to send back aggregate reports every 24 hours and
forensics report on each spoof attempt. In addition, the sender can define their policy
within the DNS record on what they want the recipient to do with their emails that do
not conform to SPF and DKIM
SPF, Sender Policy Framework, is
a mechanism which allows the
recipient of your emails to verify
that your email was sent out by
your authorized IPs. This
information is published as part
of your public DNS stating which
IP addresses your emails are
allowed to be sent from.
DKIM, DomainKeys
Identified Mail, is a
framework which allows your
emails to be digitally signed
before being sent out,
adding a layer of integrity
and authenticity.
Brief SPF and DKIM description
DMARC should be implemented in four stages.
The first stage is to gain visibility of all scenarios and relevant IPs that are being used to
send out your emails. This stage may last from one to four weeks or even more based on
your email volume and the number of email outgoing scenarios where other parties may
be involved.
The second stage is to configure/enhance the SPF and enable DKIM based on the
information gathered from stage one. This stage may take a day to a week based on who
is managing your DNS record and what change management policy you have in place.
Once you have configured rightly the SPF and DKIM, stage three is about taking the
DMARC policy to quarantine. This is where you want the recipient to still accept your SPF
and DKIM non-conform emails but with caution. The purpose is to further ensure that you
may not have missed any scenarios of your genuine emails. This stage may last from 2 to 8
weeks depending on the volume of your outgoing emails.
Stage three ensured no impact by the DMARC policy on your legitimate emails, enabling
us to implement the reject policy in stage four with caution over a period of one to four
weeks. This takes you to %100 DMARC compliant.
https://www.dmarc360.com/
Importance
DMARC has two major purposes:
Gives you visibility of your outgoing emails by defining to the recipient where to send
back aggregate or forensics reports of what happened when they received your email.
The information on the reports includes where your email came from (IP), if it was
authorized by your SPF, and if it had the digital signature (DKIM) on it. From this
information, you can further understand your genuine email outgoing environment and
accordingly enhance your overall outgoing email setup of SPF and DKIM.
Enables you to define your policy for the action you want the recipient to take on emails
that do not pass SPF and DKIM checks.
of DMARC despite having SPF and DKIM implemented:
Why do I need this first stage of implementation?
The purpose of this first stage is to ensure that there is no impact on your email delivery
along with getting visibility and understanding of your outgoing email delivery points.
https://www.dmarc360.com/
Stages
DMARC should be implemented in four stages.
The first stage is to gain visibility of all scenarios and relevant IPs that are being used to
send out your emails. This stage may last from one to four weeks or even more based on
your email volume and the number of email outgoing scenarios where other parties may
be involved.
The second stage is to configure/enhance the SPF and enable DKIM based on the
information gathered from stage one. This stage may take a day to a week based on who
is managing your DNS record and what change management policy you have in place.
Once you have configured rightly the SPF and DKIM, stage three is about taking the
DMARC policy to quarantine. This is where you want the recipient to still accept your SPF
and DKIM non-conform emails but with caution. The purpose is to further ensure that you
may not have missed any scenarios of your genuine emails. This stage may last from 2 to 8
weeks depending on the volume of your outgoing emails.
Stage three ensured no impact by the DMARC policy on your legitimate emails, enabling
us to implement the reject policy in stage four with caution over a period of one to four
weeks. This takes you to %100 DMARC compliant.
to DMARC implementation:
https://www.dmarc360.com/
Is there any confidential data in the DMARC aggregate report?
No, it does not contain any confidential data such as the header, subject, body or any form of
attachment of that email.
Understanding DMARC aggregate report:
As part of the DMARC framework, the recipients of emails (other parties) that have enabled
DMARC check will send back to the sender (you) one email (report) every 24 hours that
provides you with information regarding the total number of emails that the other party
received, claiming to be from you. This report also includes information:
• About the IP from which these mails were sent out (originated).
• If that IP is part of your authorized IP as stated in your public DNS SPF record.
• If the mail did have your digital signature as stated in your public DNS record.
Why do I need this first stage of implementation?
The purpose of this first stage is to ensure that there is no impact on your
email delivery along with getting visibility and understanding of
your outgoing email delivery points.
FAQs
Stage one - Enabling Aggregate Reports:
https://www.dmarc360.com/
What if the receiver is not checking the DMARC record?
The mail will be treated in a normal manner without any DMARC validation.
At this stage will any of my emails get blocked by the receiver?
No, there is no impact or blockage to any of your emails
Understanding DMARC policy
This policy is published as part of your public DNS record. The objective of this policy is to
inform the receiver on what they should do with your emails in case the email they re-
ceived do not have your digital signature, whereas it is claiming to be from you.
One of the example scenarios that we may identify is that your organization is using third
parties such as marketing vendors, who may be sending out emails on your behalf.
This first stage enables us to move on to stage 2, by accurately identifying all email
delivery points to enable digital signatures on all those points. Once we have identified
those points, we will also ensure to publish those points (IPs) in your public DNS SPF
record, for the receiver to verify the legitimacy of your emails.
As part of the first stage of DMARC implementation, your emails do not have any digital
signatures thereby the policy of ‘none’ means that the receiver should accept the mail in
a normal manner. Hence there is no impact (block) of your emails by any receiver who
has enabled a DMARC check.
What is the quarantine policy?
DMARC quarantine policy tells the recipient of your emails that if both SPF and DKIM checks
fail, accept the email, but mark it as spam.
Will this policy impact all my emails?
No, it will not.
We only move to stage 3 once we have high confidence that we have identified all the email
outgoing points (IPs) and accordingly have configured the authorized IPs, and digital
signatures for all those points.
For this stage, we will incrementally (in stages) increase the percentage of emails that will be
impacted by this policy if they fail BOTH, the SPF and DKIM check. There is a low probability
of any legitimate emails being impacted by this policy.
Which means we will set the rule of this policy on only 10% of your outgoing emails that will
fail both the SPF and DKIM checks, which leads to 90% of emails that fail both the checks
being accepted by the recipient as genuine. This gives us an overview of what emails are
being affected by this policy and allows us to verify that no legitimate emails are being
quarantined. if any legitimate emails do get impacted by this policy then this needs to be
addressed by fixing/enhancing the SPF and DKIM records.
https://www.dmarc360.com/
Have any email service providers enabled DMARC check on incoming emails?
Most of the common email service providers used by a large number of organizations
have enabled the DMARC check by default.
List of Email Service Providers with default DMARC check:
• Google
• Yahoo
• Messagelabs
• Microsoft Outlook
• Zoho Mail
• AOL Mail
Once you initiate stage 1, you will know this
fact by the daily number of reports that
you will receive.
Stage Two - Enhancing SPF & Configuring DKIM:
What does enhancing SPF record mean from an IP perspective?
After stage 1, we will have more clarity as to which of your email provider’s
(IPs) are being used to send out your Emails. The first step in this stage is to
review your current process on outgoing Emails and identify any
recommended changes. This would reflect by modifying IPs that may or may
not be involved as your Email outgoing IPs. With that information, we can
configure those IPs in the DNS record to reflect as your authorized IPs to send
out your Emails.
What is the Reject policy of DMARC?
DMARC reject policy tells the recipient of your emails that if both SPF and
DKIM checks fail, reject the email.
Will this policy impact all my emails?
Yes, it will impact all your emails
The quarantine policy percentage levels help verify that no legitimate email is impacted by
the DMARC policy. In other words, your SPF and DKIM records are properly configured with
all your email sending points authorized. This enables the implementation of the reject
policy on 100% of your emails, which will make you DMARC compliant.
https://www.dmarc360.com/
If I have SPF, why do I need DKIM?
There are two major reasons why you need a digital signature (DKIM) even though you
have published authorized IPs (SPF) and the receiver can know if the Email came from
those IPs.
1: An attacker can send out a forged email pretending to be from your IP Address
(known as IP spoofing)
2: When an organization have any third party,e.g marketing companies, forwarding
emails on their behalf, these emails will be perceived as fraud emails since they are not
authorized in the SPF record. You may get over this issue byincluding theirs Email
sending IPs in your authorized IPs list. At times when they change their IPs for their own
reasons, it may be challenging to maintain their IP list in your SPF configuration.
What does enhancing SPF record mean from syntax perspective?
An SPF record has an additional parameter on top of your authorized IP. This parameter is
the message to the recipient of your emails on what you want them to do if they receive
an email that did not come from one of your authorized IPs. Normally in this stage the
confidence level of ensuring identification of all your authorized IP is low, thereby your
message to recipients is that they should accept the Email anyway but treat it with
caution.
Following are the three options that you may provide in the SPF record to the
recipient of your emails
https://www.dmarc360.com/
One of the example scenarios that we may identify is that your organization is using third
parties such as marketing vendors, who may be sending out emails on your behalf.
This first stage enables us to move on to stage 2, by accurately identifying all email
delivery points to enable digital signatures on all those points. Once we have identified
those points, we will also ensure to publish those points (IPs) in your public DNS SPF
record, for the receiver to verify the legitimacy of your emails.
What is the quarantine policy?
DMARC quarantine policy tells the recipient of your emails that if both SPF and DKIM checks
fail, accept the email, but mark it as spam.
Will this policy impact all my emails?
No, it will not.
We only move to stage 3 once we have high confidence that we have identified all the email
outgoing points (IPs) and accordingly have configured the authorized IPs, and digital
signatures for all those points.
For this stage, we will incrementally (in stages) increase the percentage of emails that will be
impacted by this policy if they fail BOTH, the SPF and DKIM check. There is a low probability
of any legitimate emails being impacted by this policy.
Which means we will set the rule of this policy on only 10% of your outgoing emails that will
fail both the SPF and DKIM checks, which leads to 90% of emails that fail both the checks
being accepted by the recipient as genuine. This gives us an overview of what emails are
being affected by this policy and allows us to verify that no legitimate emails are being
quarantined. if any legitimate emails do get impacted by this policy then this needs to be
addressed by fixing/enhancing the SPF and DKIM records.
Stage Three - The Quarantine Policy:
https://www.dmarc360.com/
Have any email service providers enabled DMARC check on incoming emails?
Most of the common email service providers used by a large number of organizations
have enabled the DMARC check by default.
List of Email Service Providers with default DMARC check:
• Google
• Yahoo
• Messagelabs
• Microsoft Outlook
• Zoho Mail
• AOL Mail
What will qualify me for applying this policy on all my emails?
As mentioned we will incrementally increase the percentage of emails being impacted by
this policy. At a low percentage level, if NO legitimate emails get quarantined, we can move
onto a higher percentage until we reach 100%. At each percentage level, the impact on
emails is analyzed to verify that the legitimate emails are NOT being quarantined, eventually
leading up to Quarantine Policy on 100% of the emails. This will enable us to move on to
Stage 4 of DMARC.
What is the Reject policy of DMARC?
DMARC reject policy tells the recipient of your emails that if both SPF and
DKIM checks fail, reject the email.
Will this policy impact all my emails?
Yes, it will impact all your emails
The quarantine policy percentage levels help verify that no legitimate email is impacted by
the DMARC policy. In other words, your SPF and DKIM records are properly configured with
all your email sending points authorized. This enables the implementation of the reject
policy on 100% of your emails, which will make you DMARC compliant.
Stage Four - Reject Policy & Forensic Reports:
https://www.dmarc360.com/
https://www.dmarc360.com/
All Rights Reserved 2019 | © DMARC 360 : www.dmarc360.com
What is the DMARC forensic report?
The DMARC forensic report is a report sent back to the sender by the receiver, which
includes the subject line, header information (i.e “to” and “from”), the URLs in the email, and
attachments if any. You (the sender) can define if you would like to receive these reports in
the case of only one of the authentication checks (SPF and DKIM) failing, or both.
Will this report include my email’s confidential data?
Yes, it will, ONLY if your legitimate email fails the SPF and/or DKIM check. Since the
quarantine policy percentages helped us verify and authorize all your legitimate email
sending points, the only emails that would fail SPF and/or DKIM check would be forged
(spoofed) emails.
Why should I enable DMARC Forensic Reports if I am on reject policy?
You being on DMARC reject policy is the reason for enabling forensic reports.
Since your SPF and DKIM mechanisms are implemented and working properly, the ONLY
emails to be perceived as forged (spoof) will be genuine spoof attempts of your email
domain. Furthermore, these reports will help analyze the data within these forged emails to
identify what type of malicious URL or attachment was used.

More Related Content

Similar to DMARC360 Guide

What is dmarc
What is dmarcWhat is dmarc
What is dmarcGodmarc
 
Sender Policy Framework (SPF): An Email Authentication Technique
Sender Policy Framework (SPF): An Email Authentication TechniqueSender Policy Framework (SPF): An Email Authentication Technique
Sender Policy Framework (SPF): An Email Authentication TechniqueHTS Hosting
 
What is DMARC?
What is DMARC?What is DMARC?
What is DMARC?Godmarc
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...Gangcai Lin
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentationThe_IPA
 
NetSuite Email Campaigns Best Practices for Delivering Results
NetSuite Email Campaigns Best Practices for Delivering ResultsNetSuite Email Campaigns Best Practices for Delivering Results
NetSuite Email Campaigns Best Practices for Delivering ResultsJade Global
 
2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to KnowChris Arrendale
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARCKurt Andersen
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfBalaramaRaju2
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingTarun Arora
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
Technical Guide to Great Delivery
Technical Guide to Great DeliveryTechnical Guide to Great Delivery
Technical Guide to Great DeliveryCopernica BV
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCMailkit
 
Complete guide to_email
Complete guide to_emailComplete guide to_email
Complete guide to_emailRochelle Lee
 
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdfAkandeDavis1
 
DMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting
DMARC adaption Case Study in Rakuten JPAAWG 2nd General MeetingDMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting
DMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting顕志 北浦
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustVivastream
 

Similar to DMARC360 Guide (20)

Article on DMARC
Article on DMARCArticle on DMARC
Article on DMARC
 
What is dmarc
What is dmarcWhat is dmarc
What is dmarc
 
Sender Policy Framework (SPF): An Email Authentication Technique
Sender Policy Framework (SPF): An Email Authentication TechniqueSender Policy Framework (SPF): An Email Authentication Technique
Sender Policy Framework (SPF): An Email Authentication Technique
 
What is DMARC?
What is DMARC?What is DMARC?
What is DMARC?
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation
 
The Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email MarketingThe Complete Guide to B2B Email Marketing
The Complete Guide to B2B Email Marketing
 
NetSuite Email Campaigns Best Practices for Delivering Results
NetSuite Email Campaigns Best Practices for Delivering ResultsNetSuite Email Campaigns Best Practices for Delivering Results
NetSuite Email Campaigns Best Practices for Delivering Results
 
2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARC
 
understanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdfunderstanding-email-deliverability-salesforce-version-final-july2023.pdf
understanding-email-deliverability-salesforce-version-final-july2023.pdf
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
Technical Guide to Great Delivery
Technical Guide to Great DeliveryTechnical Guide to Great Delivery
Technical Guide to Great Delivery
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
 
Complete guide to_email
Complete guide to_emailComplete guide to_email
Complete guide to_email
 
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf
[Tips/Tricks] Unlocking Deliverability With Marketo Engage.pdf
 
DMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting
DMARC adaption Case Study in Rakuten JPAAWG 2nd General MeetingDMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting
DMARC adaption Case Study in Rakuten JPAAWG 2nd General Meeting
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
DKIM PRes.pptx
DKIM PRes.pptxDKIM PRes.pptx
DKIM PRes.pptx
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

DMARC360 Guide

  • 2. Introduction to DMARC: DMARC, Domain-based Message Authentication Reporting and Conformance, is an email security framework introduced in 2014. It is a reporting mechanism built upon two existing public DNS records, SPF and DKIM. Furthermore, it enables recipients to send back aggregate reports every 24 hours and forensics report on each spoof attempt. In addition, the sender can define their policy within the DNS record on what they want the recipient to do with their emails that do not conform to SPF and DKIM SPF, Sender Policy Framework, is a mechanism which allows the recipient of your emails to verify that your email was sent out by your authorized IPs. This information is published as part of your public DNS stating which IP addresses your emails are allowed to be sent from. DKIM, DomainKeys Identified Mail, is a framework which allows your emails to be digitally signed before being sent out, adding a layer of integrity and authenticity. Brief SPF and DKIM description DMARC should be implemented in four stages. The first stage is to gain visibility of all scenarios and relevant IPs that are being used to send out your emails. This stage may last from one to four weeks or even more based on your email volume and the number of email outgoing scenarios where other parties may be involved. The second stage is to configure/enhance the SPF and enable DKIM based on the information gathered from stage one. This stage may take a day to a week based on who is managing your DNS record and what change management policy you have in place. Once you have configured rightly the SPF and DKIM, stage three is about taking the DMARC policy to quarantine. This is where you want the recipient to still accept your SPF and DKIM non-conform emails but with caution. The purpose is to further ensure that you may not have missed any scenarios of your genuine emails. This stage may last from 2 to 8 weeks depending on the volume of your outgoing emails. Stage three ensured no impact by the DMARC policy on your legitimate emails, enabling us to implement the reject policy in stage four with caution over a period of one to four weeks. This takes you to %100 DMARC compliant. https://www.dmarc360.com/
  • 3. Importance DMARC has two major purposes: Gives you visibility of your outgoing emails by defining to the recipient where to send back aggregate or forensics reports of what happened when they received your email. The information on the reports includes where your email came from (IP), if it was authorized by your SPF, and if it had the digital signature (DKIM) on it. From this information, you can further understand your genuine email outgoing environment and accordingly enhance your overall outgoing email setup of SPF and DKIM. Enables you to define your policy for the action you want the recipient to take on emails that do not pass SPF and DKIM checks. of DMARC despite having SPF and DKIM implemented: Why do I need this first stage of implementation? The purpose of this first stage is to ensure that there is no impact on your email delivery along with getting visibility and understanding of your outgoing email delivery points. https://www.dmarc360.com/
  • 4.
  • 5. Stages DMARC should be implemented in four stages. The first stage is to gain visibility of all scenarios and relevant IPs that are being used to send out your emails. This stage may last from one to four weeks or even more based on your email volume and the number of email outgoing scenarios where other parties may be involved. The second stage is to configure/enhance the SPF and enable DKIM based on the information gathered from stage one. This stage may take a day to a week based on who is managing your DNS record and what change management policy you have in place. Once you have configured rightly the SPF and DKIM, stage three is about taking the DMARC policy to quarantine. This is where you want the recipient to still accept your SPF and DKIM non-conform emails but with caution. The purpose is to further ensure that you may not have missed any scenarios of your genuine emails. This stage may last from 2 to 8 weeks depending on the volume of your outgoing emails. Stage three ensured no impact by the DMARC policy on your legitimate emails, enabling us to implement the reject policy in stage four with caution over a period of one to four weeks. This takes you to %100 DMARC compliant. to DMARC implementation: https://www.dmarc360.com/
  • 6. Is there any confidential data in the DMARC aggregate report? No, it does not contain any confidential data such as the header, subject, body or any form of attachment of that email. Understanding DMARC aggregate report: As part of the DMARC framework, the recipients of emails (other parties) that have enabled DMARC check will send back to the sender (you) one email (report) every 24 hours that provides you with information regarding the total number of emails that the other party received, claiming to be from you. This report also includes information: • About the IP from which these mails were sent out (originated). • If that IP is part of your authorized IP as stated in your public DNS SPF record. • If the mail did have your digital signature as stated in your public DNS record. Why do I need this first stage of implementation? The purpose of this first stage is to ensure that there is no impact on your email delivery along with getting visibility and understanding of your outgoing email delivery points. FAQs Stage one - Enabling Aggregate Reports: https://www.dmarc360.com/
  • 7. What if the receiver is not checking the DMARC record? The mail will be treated in a normal manner without any DMARC validation. At this stage will any of my emails get blocked by the receiver? No, there is no impact or blockage to any of your emails Understanding DMARC policy This policy is published as part of your public DNS record. The objective of this policy is to inform the receiver on what they should do with your emails in case the email they re- ceived do not have your digital signature, whereas it is claiming to be from you. One of the example scenarios that we may identify is that your organization is using third parties such as marketing vendors, who may be sending out emails on your behalf. This first stage enables us to move on to stage 2, by accurately identifying all email delivery points to enable digital signatures on all those points. Once we have identified those points, we will also ensure to publish those points (IPs) in your public DNS SPF record, for the receiver to verify the legitimacy of your emails. As part of the first stage of DMARC implementation, your emails do not have any digital signatures thereby the policy of ‘none’ means that the receiver should accept the mail in a normal manner. Hence there is no impact (block) of your emails by any receiver who has enabled a DMARC check. What is the quarantine policy? DMARC quarantine policy tells the recipient of your emails that if both SPF and DKIM checks fail, accept the email, but mark it as spam. Will this policy impact all my emails? No, it will not. We only move to stage 3 once we have high confidence that we have identified all the email outgoing points (IPs) and accordingly have configured the authorized IPs, and digital signatures for all those points. For this stage, we will incrementally (in stages) increase the percentage of emails that will be impacted by this policy if they fail BOTH, the SPF and DKIM check. There is a low probability of any legitimate emails being impacted by this policy. Which means we will set the rule of this policy on only 10% of your outgoing emails that will fail both the SPF and DKIM checks, which leads to 90% of emails that fail both the checks being accepted by the recipient as genuine. This gives us an overview of what emails are being affected by this policy and allows us to verify that no legitimate emails are being quarantined. if any legitimate emails do get impacted by this policy then this needs to be addressed by fixing/enhancing the SPF and DKIM records. https://www.dmarc360.com/
  • 8. Have any email service providers enabled DMARC check on incoming emails? Most of the common email service providers used by a large number of organizations have enabled the DMARC check by default. List of Email Service Providers with default DMARC check: • Google • Yahoo • Messagelabs • Microsoft Outlook • Zoho Mail • AOL Mail Once you initiate stage 1, you will know this fact by the daily number of reports that you will receive. Stage Two - Enhancing SPF & Configuring DKIM: What does enhancing SPF record mean from an IP perspective? After stage 1, we will have more clarity as to which of your email provider’s (IPs) are being used to send out your Emails. The first step in this stage is to review your current process on outgoing Emails and identify any recommended changes. This would reflect by modifying IPs that may or may not be involved as your Email outgoing IPs. With that information, we can configure those IPs in the DNS record to reflect as your authorized IPs to send out your Emails. What is the Reject policy of DMARC? DMARC reject policy tells the recipient of your emails that if both SPF and DKIM checks fail, reject the email. Will this policy impact all my emails? Yes, it will impact all your emails The quarantine policy percentage levels help verify that no legitimate email is impacted by the DMARC policy. In other words, your SPF and DKIM records are properly configured with all your email sending points authorized. This enables the implementation of the reject policy on 100% of your emails, which will make you DMARC compliant. https://www.dmarc360.com/
  • 9. If I have SPF, why do I need DKIM? There are two major reasons why you need a digital signature (DKIM) even though you have published authorized IPs (SPF) and the receiver can know if the Email came from those IPs. 1: An attacker can send out a forged email pretending to be from your IP Address (known as IP spoofing) 2: When an organization have any third party,e.g marketing companies, forwarding emails on their behalf, these emails will be perceived as fraud emails since they are not authorized in the SPF record. You may get over this issue byincluding theirs Email sending IPs in your authorized IPs list. At times when they change their IPs for their own reasons, it may be challenging to maintain their IP list in your SPF configuration. What does enhancing SPF record mean from syntax perspective? An SPF record has an additional parameter on top of your authorized IP. This parameter is the message to the recipient of your emails on what you want them to do if they receive an email that did not come from one of your authorized IPs. Normally in this stage the confidence level of ensuring identification of all your authorized IP is low, thereby your message to recipients is that they should accept the Email anyway but treat it with caution. Following are the three options that you may provide in the SPF record to the recipient of your emails https://www.dmarc360.com/
  • 10. One of the example scenarios that we may identify is that your organization is using third parties such as marketing vendors, who may be sending out emails on your behalf. This first stage enables us to move on to stage 2, by accurately identifying all email delivery points to enable digital signatures on all those points. Once we have identified those points, we will also ensure to publish those points (IPs) in your public DNS SPF record, for the receiver to verify the legitimacy of your emails. What is the quarantine policy? DMARC quarantine policy tells the recipient of your emails that if both SPF and DKIM checks fail, accept the email, but mark it as spam. Will this policy impact all my emails? No, it will not. We only move to stage 3 once we have high confidence that we have identified all the email outgoing points (IPs) and accordingly have configured the authorized IPs, and digital signatures for all those points. For this stage, we will incrementally (in stages) increase the percentage of emails that will be impacted by this policy if they fail BOTH, the SPF and DKIM check. There is a low probability of any legitimate emails being impacted by this policy. Which means we will set the rule of this policy on only 10% of your outgoing emails that will fail both the SPF and DKIM checks, which leads to 90% of emails that fail both the checks being accepted by the recipient as genuine. This gives us an overview of what emails are being affected by this policy and allows us to verify that no legitimate emails are being quarantined. if any legitimate emails do get impacted by this policy then this needs to be addressed by fixing/enhancing the SPF and DKIM records. Stage Three - The Quarantine Policy: https://www.dmarc360.com/
  • 11. Have any email service providers enabled DMARC check on incoming emails? Most of the common email service providers used by a large number of organizations have enabled the DMARC check by default. List of Email Service Providers with default DMARC check: • Google • Yahoo • Messagelabs • Microsoft Outlook • Zoho Mail • AOL Mail What will qualify me for applying this policy on all my emails? As mentioned we will incrementally increase the percentage of emails being impacted by this policy. At a low percentage level, if NO legitimate emails get quarantined, we can move onto a higher percentage until we reach 100%. At each percentage level, the impact on emails is analyzed to verify that the legitimate emails are NOT being quarantined, eventually leading up to Quarantine Policy on 100% of the emails. This will enable us to move on to Stage 4 of DMARC. What is the Reject policy of DMARC? DMARC reject policy tells the recipient of your emails that if both SPF and DKIM checks fail, reject the email. Will this policy impact all my emails? Yes, it will impact all your emails The quarantine policy percentage levels help verify that no legitimate email is impacted by the DMARC policy. In other words, your SPF and DKIM records are properly configured with all your email sending points authorized. This enables the implementation of the reject policy on 100% of your emails, which will make you DMARC compliant. Stage Four - Reject Policy & Forensic Reports: https://www.dmarc360.com/
  • 12. https://www.dmarc360.com/ All Rights Reserved 2019 | © DMARC 360 : www.dmarc360.com What is the DMARC forensic report? The DMARC forensic report is a report sent back to the sender by the receiver, which includes the subject line, header information (i.e “to” and “from”), the URLs in the email, and attachments if any. You (the sender) can define if you would like to receive these reports in the case of only one of the authentication checks (SPF and DKIM) failing, or both. Will this report include my email’s confidential data? Yes, it will, ONLY if your legitimate email fails the SPF and/or DKIM check. Since the quarantine policy percentages helped us verify and authorize all your legitimate email sending points, the only emails that would fail SPF and/or DKIM check would be forged (spoofed) emails. Why should I enable DMARC Forensic Reports if I am on reject policy? You being on DMARC reject policy is the reason for enabling forensic reports. Since your SPF and DKIM mechanisms are implemented and working properly, the ONLY emails to be perceived as forged (spoof) will be genuine spoof attempts of your email domain. Furthermore, these reports will help analyze the data within these forged emails to identify what type of malicious URL or attachment was used.