DMARC Reports Email Security

How to Analyze DMARC Reports Effectively

Learn to interpret DMARC aggregate and forensic reports to improve your email security posture.

L

Lucie from DMARC Moon

October 20, 2025

How to Analyze DMARC Reports Effectively

What Are DMARC Reports?

DMARC Reports are feedback documents sent by receiving mail servers that tell you what happened to emails claiming to be from your domain. They're the visibility mechanism that makes DMARC actionable—without reports, you'd be flying blind.

Understanding DMARC Reports

When you publish a DMARC record with a reporting address, receiving mail servers send you detailed information about emails they receive. If you haven't set up reporting yet, use our DMARC generator to create a record with proper RUA/RUF addresses. There are two types of reports:

1. Aggregate Reports (RUA)

  • Format: XML files, often compressed (gzip or zip)
  • Frequency: Typically sent daily (can vary by provider)
  • Content: Statistical summary of email authentication results
  • Purpose: Understand your email ecosystem and authentication health
DMARC Moon DMARC RUA Reports dashboard showing email traffic analysis and geographic sources
DMARC Moon transforms complex XML reports into visual dashboards with email traffic trends and geographic source mapping

2. Forensic Reports (RUF)

  • Format: Individual email messages with full headers
  • Frequency: Sent per failure (when enabled)
  • Content: Detailed information about specific emails that failed
  • Limitation: Many providers (Gmail, Microsoft) no longer send RUF reports due to privacy concerns

What Aggregate Reports Contain

Each aggregate report includes several key sections:

Report Metadata

<report_metadata>
  <org_name>google.com</org_name>
  <email>[email protected]</email>
  <report_id>12345678901234567890</report_id>
  <date_range>
    <begin>1704067200</begin>
    <end>1704153599</end>
  </date_range>
</report_metadata>
  • org_name: Who sent the report (the receiving mail provider)
  • report_id: Unique identifier for this report
  • date_range: The time period covered (Unix timestamps)

Policy Published

<policy_published>
  <domain>yourdomain.com</domain>
  <adkim>r</adkim>
  <aspf>r</aspf>
  <p>quarantine</p>
  <sp>quarantine</sp>
  <pct>100</pct>
</policy_published>
  • domain: Your domain being reported on
  • p: Your DMARC policy (none, quarantine, reject)
  • adkim/aspf: Alignment modes (r=relaxed, s=strict)
  • pct: Percentage of mail subject to policy

Record (The Important Part)

<record>
  <row>
    <source_ip>203.0.113.45</source_ip>
    <count>1523</count>
    <policy_evaluated>
      <disposition>none</disposition>
      <dkim>pass</dkim>
      <spf>pass</spf>
    </policy_evaluated>
  </row>
  <identifiers>
    <header_from>yourdomain.com</header_from>
  </identifiers>
  <auth_results>
    <dkim>
      <domain>yourdomain.com</domain>
      <result>pass</result>
      <selector>default</selector>
    </dkim>
    <spf>
      <domain>yourdomain.com</domain>
      <result>pass</result>
    </spf>
  </auth_results>
</record>
  • source_ip: IP address that sent the email
  • count: Number of emails from this IP
  • disposition: What action was taken (none, quarantine, reject)
  • dkim/spf: Authentication results and alignment status

Common Issues Found in Reports

Legitimate Emails Failing Authentication

This is the most critical issue to identify. When legitimate email sources fail DMARC:

Scenario: You see failures from an IP address you recognize as your marketing platform.

  • Source IP: Your marketing platform's IP
  • SPF Result: Fail
  • DKIM Result: Fail

The Problem: The marketing platform isn't properly configured with SPF or DKIM for your domain.

Solution:

  1. Add the platform's IP range or include statement to your SPF record—use our SPF generator to create the correct record
  2. Configure custom DKIM signing with your domain through the platform—verify with our DKIM lookup tool
  3. Verify alignment (custom return-path domain if needed)

Unknown Sending Sources

Reports reveal IP addresses you don't recognize sending email as your domain.

Scenario: You see email volume from IP addresses not in your inventory.

  • Source IP: Unknown
  • Volume: Varies (could be low or high)
  • Authentication: Usually failing

Investigation Steps:

  1. Perform reverse DNS lookup on the IP
  2. Check IP geolocation
  3. Ask your teams if anyone knows this service
  4. Determine if it's a forgotten legitimate service or malicious activity

If legitimate: Configure proper authentication. If malicious: Your DMARC policy is protecting you—consider enforcing if you haven't already. You can also check if the IP is on any email blacklists.

SPF Alignment Failures

SPF passes but alignment fails—this is common with third-party senders.

Scenario: Email authenticated via SPF, but DMARC still fails.

  • SPF Result: Pass
  • SPF Alignment: Fail
  • DKIM: Not configured or failing

The Problem: The SPF-authenticated domain (return-path) doesn't match the From header domain.

Solution: Configure a custom return-path domain (subdomain of your domain) or ensure DKIM is properly aligned as a backup. Check your current SPF configuration with our SPF lookup tool.

For a deeper dive, see our SPF alignment guide.

Forwarding Issues

Email forwarding inherently breaks SPF because the forwarding server's IP isn't in your SPF record.

Scenario: You see SPF failures from IP addresses that look like other organizations' mail servers.

  • SPF Result: Fail
  • DKIM Result: May pass (if email wasn't modified) or fail

Understanding: This is expected behavior. When someone forwards your email, SPF will fail because the forwarding server isn't authorized in your SPF record. DKIM should still pass if the email wasn't modified.

What to do: This is why DMARC uses "OR" logic. Ensure DKIM is properly configured as a fallback for forwarded email.

Key Metrics to Monitor

Pass Rate

Calculate your overall DMARC pass rate:

Pass Rate = (Emails Passing DMARC / Total Emails) × 100%
  • Target: 95%+ for legitimate email sources
  • Action: Investigate any source with pass rate below 95%

Authentication Results by Source

Group report data by sending IP to identify:

  • Legitimate senders with authentication issues
  • Unknown sources that need investigation
  • Third-party services needing configuration

Policy Actions

Track what actions receiving servers took:

  • none — Email delivered normally (monitoring mode)
  • quarantine — Email sent to spam/junk
  • reject — Email blocked

Volume Trends

Monitor email volume over time to detect:

  • Unusual spikes (potential spoofing attacks)
  • Gradual increases (new services or campaigns)
  • Sudden drops (deliverability issues)
DMARC Moon AI-Powered Report Analysis showing summary, key findings, and recommendations
DMARC Moon's AI-powered analysis provides actionable insights, risk assessment, and specific recommendations for each report

Building an Analysis Workflow

Follow this workflow for effective report analysis:

Step 1: Collect and Aggregate

Set up a system to collect DMARC reports. Manual processing of XML files doesn't scale—use a DMARC monitoring platform like DMARC Moon.

Step 2: Identify Your Senders

Build an inventory of all legitimate email sources:

  • Your main mail server(s)
  • Marketing platforms
  • Transactional email services
  • CRM systems
  • Support ticketing systems
  • Internal applications

Step 3: Investigate Failures

For each failing source, answer:

  1. Is this a legitimate sender?
  2. Why is authentication failing?
  3. What action is needed to fix it?

Step 4: Fix Authentication Issues

Common fixes include:

  • Adding IP ranges to SPF records
  • Configuring DKIM signing for third-party services
  • Setting up custom return-path domains
  • Working with vendors on authentication support

Step 5: Progress Your Policy

Use report insights to safely increase enforcement:

  • Pass rate consistently above 95%? Move from p=none to p=quarantine
  • Pass rate above 99%? Move from p=quarantine to p=reject

For detailed guidance on policy progression, see our DMARC policies guide.

FAQ

How often should I review DMARC reports?

Review frequency depends on your situation:

  • Initial setup (p=none): Review weekly to discover all email sources
  • During policy progression: Review every few days to catch issues quickly
  • Stable enforcement (p=reject): Review monthly or set up alerts for anomalies

Use automated monitoring tools to alert you to sudden changes so you don't have to check manually every day.

Why am I receiving reports from providers I don't send email to?

This is normal. When someone spoofs your domain (sends fake emails pretending to be from you), those emails may be received by users at various providers. Those providers then send you DMARC reports about the failed authentication.

This is actually valuable information—it shows you attempted abuse of your domain and confirms your DMARC policy is protecting against spoofing.

What does it mean when SPF passes but alignment fails?

This means the email was sent from an authorized server (SPF passed), but the domain used for SPF authentication doesn't match the From header domain.

Example:

To fix this, configure a custom return-path domain (like bounces.yourdomain.com) with your third-party sender.

How do I identify which service is sending from a specific IP?

Several techniques help identify unknown IPs:

  1. Reverse DNS lookup: Often reveals the service name
  2. IP geolocation: Shows the general location and hosting provider
  3. WHOIS lookup: Shows who owns the IP block
  4. Ask your team: Someone may recognize the service
  5. Check email headers: If you have forensic reports, headers provide context

Why don't I receive forensic (RUF) reports?

Many large mailbox providers (including Gmail and Microsoft) have stopped sending forensic reports due to privacy concerns. The reports contain email content and headers, which could expose personal information.

Don't rely solely on RUF reports. Aggregate reports (RUA) provide sufficient data for most DMARC analysis and policy decisions.

How do I handle high-volume reports?

Large organizations can receive thousands of DMARC reports daily. To handle this:

  • Use a dedicated DMARC monitoring platform (not a general email inbox)
  • Aggregate data across reports rather than reading each one
  • Focus on trends and anomalies rather than individual emails
  • Set up automated alerts for significant changes

What's a good DMARC pass rate before enforcing?

Before moving from p=none to p=quarantine:

  • Target: 95%+ pass rate for legitimate sources
  • All known email services should be identified and configured
  • No critical authentication gaps remaining

Before moving from p=quarantine to p=reject:

  • Target: 99%+ pass rate
  • No legitimate email being quarantined
  • Confidence in complete sender inventory

Can I use AI to analyze my DMARC reports?

Yes. Modern DMARC monitoring platforms like DMARC Moon use AI to:

  • Identify patterns humans might miss
  • Prioritize issues by impact and risk
  • Suggest specific remediation steps
  • Detect spoofing and phishing attempts
  • Predict trends based on historical data

AI analysis is particularly valuable when dealing with high report volumes or complex email ecosystems.

Ready to Analyze Your DMARC Reports?

DMARC Moon makes DMARC report analysis simple and actionable:

  • Automatic report collection and parsing
  • Visual dashboards for easy understanding
  • AI-powered analysis and recommendations
  • Alerts for authentication issues
  • Historical trend tracking
Start your free trial today and turn your DMARC reports into actionable insights.

Enjoyed this article?

Share it with your network

Stay Updated

Get More Email Security Insights

Subscribe to our newsletter for the latest DMARC tips, guides, and best practices.

No spam, unsubscribe at any time.