How to Set Up DMARC & Prepare Your Domain for VMC Certificate

How to Set Up DMARC & Prepare Your Domain for VMC Certificate

Email providers no longer trust a domain just because it appears in the “From” address. Authentication has to back it up and that’s where DMARC comes in. Any domain planning to deploy a Verified Mark Certificate must first run DMARC with an enforcement policy. Mail providers rely on that policy to verify the sender before showing a brand logo in the inbox.

This guide walks through the practical side of it: setting up DMARC and moving the domain toward enforcement, so it’s ready for BIMI and VMC deployment.

What is DMARC?

DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication policy published as a TXT record in DNS. It lets receiving mail servers verify whether messages claiming to come from your domain are actually authorized. DMARC works on top of SPF and DKIM, checking that at least one of them passes and aligns with the sending domain.

The record also tells receivers what to do when authentication fails. Three policies exist:

  • p=none for monitoring
  • p=quarantine to route suspicious mail to spam
  • p=reject to block it outright

Beyond enforcement, DMARC produces reports that show which systems are sending mail using your domain and whether those messages pass authentication.

Why DMARC Compliance is Required for a VMC Certificate

A Verified Mark Certificate (VMC) connects a brand’s trademarked logo to the domain sending the email. Inbox providers won’t show that logo unless the sending domain proves it controls who can send mail in its name. That control comes from DMARC enforcement.

When an email arrives, receiving servers run authentication checks in layers:

  • SPF checks whether the sending server is authorized for the domain
  • DKIM verifies the message signature and confirms it wasn’t altered
  • DMARC applies the policy published in DNS and determines how to handle messages that fail authentication

DMARC is the point where the domain owner sets the rule. The policy tells receivers what action to take if authentication fails.

For VMC eligibility, monitoring mode is not enough. The domain must run DMARC with an enforcement policy (quarantine or reject). Mail providers expect the domain to actively filter or block unauthorized senders before they allow brand indicators in the inbox.

This requirement directly affects BIMI deployment. The BIMI record points to the hosted logo and the VMC, but the inbox provider still checks the domain’s DMARC policy before displaying that logo. If DMARC enforcement is missing, the logo is simply not shown.

Step-by-Step DMARC Setup

DMARC deployment is not a single DNS change. It is a sequence: identify senders, authenticate them, observe traffic, then introduce enforcement.

Step 1: Identify All Email Sending Sources

Begin by listing every system that use you domain to send email. Many domains have more email sources than expected.

Typical sources include:

  • Web servers generating application or contact-form emails
  • Internal or office mail servers
  • ISP mail infrastructure
  • Third-party services sending mail on your behalf

Missing even one legitimate sender can break authentication once DMARC enforcement starts. The goal here is simple: map every system using your domain in the “From” address.

Step 2: Create and Publish Your SPF Record

Once sending systems are identified, define them in SPF. Sender Policy Framework controls which servers are allowed to send email using your domain.

Basic workflow:

  • Gather the sending IP addresses
  • Create an SPF TXT record
  • Publish the record in DNS
  • Verify the record with an SPF checker

Example SPF record:

v=spf1 ip4:1.2.3.4 ip4:2.3.4.5 -all

When a receiving server processes an email, it checks whether the sending IP appears in that list. If not, SPF fails.

Step 3: Configure DKIM for Email Signing

SPF verifies the sending server. DKIM (DomainKeys Identified Mail) handles message integrity.

Setting up DKIM typically involves:

  • Choosing a DKIM selector
  • Generating a public/private key pair
  • Adding public key as a DNS TXT record

Example DKIM record:

v=DKIM1; p=YourPublicKey

Outgoing messages are signed with the private key. Receiving servers use the DNS-published public key to validate the signature and confirm the message wasn’t modified during transit.

Step 4: Create a DMARC Record in Monitoring Mode

With SPF and DKIM active, introduce DMARC in monitoring mode first. This allows you to observe real email traffic before enforcing any filtering rules.

Create a TXT record at:
_dmarc.yourdomain.com

Example record:
v=DMARC1; p=none; rua=mailto:dmarcreports@domain.com

Monitoring mode does not block mail. Instead, it collects reports from receiving servers showing how messages from your domain authenticate.

Understanding DMARC Reports

DMARC reports reveal what’s actually sending email using your domain. Each report contains data such as:

  • Sending IP addresses
  • Message volumes per source
  • SPF authentication results
  • DKIM authentication results
  • Actions taken under the current DMARC policy

These reports help identify:

  • Unknown systems sending email
  • Spoofing attempts
  • Legitimate senders missing from SPF or DKIM configuration

Reviewing this data before enforcement avoids accidental disruptions.

Step 5: Move From Monitoring to Enforcement

After reviewing reports and correcting authentication issues, move toward enforcement.

The first enforcement stage usually uses quarantine with a small filtering percentage.

Example:
v=DMARC1; p=quarantine; pct=10; rua=mailto:dmarcreports@domain.com

Start with a low percentage and gradually increase it. This approach filters a portion of failing messages while still allowing most traffic through.

Over time, increase the percentage until filtering reaches 100%.

Step 6: Implement the Reject Policy

The final stage is reject, the strictest DMARC policy.

Example:
v=DMARC1; p=reject; pct=100; rua=mailto:dmarcreports@domain.com

At this stage, receiving servers block messages that fail authentication instead of delivering them to inboxes or spam folders.

Reject enforcement stops spoofed emails from using your domain and establishes the authentication posture required for VMC eligibility.

Preparing Your Domain for VMC

DMARC enforcement is only one part of the VMC requirement. Inbox providers also check the brand identity and BIMI configuration before displaying a logo.

Key requirements include:

  • Trademarked brand logo

The logo must be officially registered with a recognized trademark authority.

  • Logo in SVG Tiny 1.2 format

The trademarked logo needs to be converted to SVG Tiny 1.2, the format required for BIMI compatibility. The file must be hosted on an HTTPS-accessible server.

  • BIMI DNS record

A BIMI TXT record must be published in DNS pointing to the hosted logo and the certificate file.

  • Verified Mark Certificate issued by a trusted CA

A certificate authority validates the organization, domain ownership, and trademark registration before issuing the VMC. The certificate is then referenced in the BIMI record.

With these pieces in place, inbox providers can verify the sending domain and safely display the brand logo for authenticated email streams.

Conclusion

Getting a Verified Mark Certificate starts with proper email authentication. SPF defines authorized senders. DKIM signs the message. DMARC enforcement ties those checks together and blocks unauthorized use of the domain.

Once that foundation is in place, the domain is ready for BIMI configuration and VMC issuance, allowing supported inboxes to display the verified brand logo next to authenticated emails.

Prepare Your Domain for Verified Inbox Identity

DMARC enforcement unlocks BIMI and makes your brand eligible for verified logo display in supported inboxes. Deploy a Verified Mark Certificate to turn authenticated emails into recognizable, trusted brand messages.

Related Posts:

4.8/5 star
overall satisfaction rating
4642 reviews
from actual customers at
review
Star
No problems at all. Only m,issing a good discount for a Multi domain wildcart cert. :-)
John A
review
Star
Excellent but amount need to reduce or give same amount in renewal time if possible....
RK Techsoft I
review
Star
Since 1 year i am using wild card ssl and there were no issues, also the chat support is very prompt and knowledgeable. Keep up with the same passion and policy.
Tarak G