GDPR Compliance

We use cookies to ensure you get the best experience on our website. By continuing, you accept our use of cookies, privacy policy and terms of service.

Hosted DMARC — Managed Email Authentication

See Who's Sending
Email As Your Domain.

Hosted DMARC gives you complete visibility over every email sent using your domain — legitimate senders, misconfigured tools, and active phishing attempts. Migomail manages your DMARC policy, processes aggregate reports from every major mailbox provider, and guides you to p=reject without breaking legitimate mail.

RUA Report Processing Phishing Detection Source Discovery Policy Escalation Real-Time Alerts
Hosted DMARC
99.7%
DMARC Pass Rate (p=reject)
4,000+
Spoofed Emails Blocked/Month
Full
Sender Source Visibility
Daily
Aggregate Report Processing
< 6wks
Avg Time to p=reject
4.9★
Customer Rating
Hosted DMARC Capabilities

Everything DMARC —
Managed, Monitored, Reported

Setting a DMARC record is 5 minutes of DNS work. Understanding and acting on DMARC reports is an ongoing programme. Hosted DMARC gives you the platform, the processing, and the expertise to get from p=none to p=reject safely.

01

Aggregate Report (RUA) Processing

DMARC RUA reports arrive as raw XML attachments from Gmail, Outlook, Yahoo, and every other mailbox provider that participates — daily, per-provider. Migomail receives these reports on your behalf, parses the XML, and presents the data as a human-readable dashboard showing which sources are sending email as your domain, their volumes, and their pass/fail rates.

Daily XML ingestion from all providersAll RFC 7489 report formats supportedHistorical trend data retainedPer-provider breakdown
02

Sender Source Discovery

The most valuable thing DMARC reports reveal is the complete list of sources sending email on behalf of your domain — including legitimate senders you configured, legitimate senders you forgot to configure (old ESPs, CRMs, marketing tools), and completely unauthorised sources. Migomail categorises every discovered source and flags the ones that need attention.

Authorised vs unauthorised source labellingThird-party sender identificationForgotten/legacy sender flaggingNew source instant alert
03

Managed Policy Escalation

Moving from p=none to p=reject requires confidence that every legitimate sender is authenticated. Migomail tracks your authentication pass rate and tells you exactly when it is safe to escalate — and guides you through the pct= (percentage) rollout from 10% to 25% to 50% to 100% to manage risk at each stage.

Pass rate threshold monitoringpct= rollout guidanceEscalation readiness indicatorStep-by-step wizard
04

Phishing & Spoofing Detection

At p=reject, every email sent using your domain that fails DMARC is rejected before delivery. DMARC aggregate reports show you which providers are seeing these attempts, at what volume, and from which IP addresses — giving you visibility into active phishing campaigns using your brand before your customers report them.

Active phishing campaign visibilitySource IP geolocationVolume trend alertingBrand abuse dashboard
05

Real-Time Policy Alerts

Migomail monitors your DMARC configuration and aggregate report data continuously — alerting you immediately when a new sender source appears using your domain, when an existing authenticated sender starts failing, when your DMARC pass rate drops below threshold, or when a high-volume phishing campaign begins.

New unauthorised sender alertPass rate drop alertHigh-volume attack alertPolicy configuration change alert
06

BIMI Readiness & Lock Step

BIMI — which displays your brand logo in Gmail and Yahoo subscriber inboxes — requires DMARC at p=reject with pct=100 as a prerequisite. Hosted DMARC tracks your BIMI readiness at every stage of your policy escalation journey, so you reach logo display eligibility as quickly as possible.

BIMI readiness indicatorVMC guidance integrationp=reject verificationLogo preview in dashboard
07

Multi-Domain Management

Enterprise senders, agencies, and businesses with multiple brands typically send from several domains — yourbrand.com, mail.yourbrand.com, youranotherbrand.com. Hosted DMARC manages separate DMARC configurations for every domain under your account with per-domain dashboards, alerts, and policy escalation tracking.

Unlimited domains per accountPer-domain policy and reportingSubdomain policy managementCross-domain attack correlation
08

Compliance & Audit Reports

Many enterprise procurement requirements, ISO 27001 audits, and regulatory frameworks ask for documented evidence of domain authentication controls. Migomail generates exportable DMARC compliance reports showing policy configuration, pass rates, source inventory, and escalation history — in formats accepted by common audit frameworks.

Exportable compliance report PDFPolicy history logSource inventory exportAudit-ready format
DMARC Aggregate Report Dashboard

Every Source Sending Email
as Your Domain — in One View

Every DMARC aggregate report from every mailbox provider is processed and merged into a single dashboard. You see who is sending, how much, and whether they are authenticating correctly.

DMARC Aggregate Report — yourbrand.com
Last 30 days · 14 providers reporting
284,621
Total Messages
282,891
DMARC Pass
1,730
DMARC Fail
99.4%
Pass Rate
Sender Source
Volume
DKIM
SPF
DMARC
Status
Migomail (ESP)
Your email marketing sends
167,420
PASS
PASS
PASS
Authorised
Google Workspace
Staff email — gsuite.google.com
58,340
PASS
PASS
PASS
Authorised
Salesforce CRM
Automated CRM notifications
41,280
PASS
PASS
PASS
Authorised
Legacy SendGrid
Old transactional config — unconfigured
12,190
FAIL
FAIL
FAIL
⚠ Fix needed
Unknown — 185.x.x.x
No reverse DNS · not in SPF
1,730
FAIL
FAIL
FAIL
🚨 Spoofing
Pass Rate Breakdown
99.4%
DMARC Pass
99.4%
DMARC Fail
0.6%
Recent Alerts
Legacy SendGrid sending without DKIM — fix SPF include
2 hours ago
New spoofing source detected: 185.23.x.x — 1,730 attempts
4 hours ago
Google Workspace DMARC pass rate: 100%
1 day ago
Current Policy Status
Current Policy p=quarantine · pct=100
Pass Rate 99.4% (target: 99.5%)
Readiness Ready to escalate to p=reject
BIMI Status Blocked — requires p=reject
The Policy Journey

From p=none to p=reject —
Migomail Manages Every Stage

DMARC is not a single DNS record you add and forget — it is a progressive journey from monitoring to full enforcement. Most senders take 6–12 weeks to reach p=reject safely. Hosted DMARC gets you there in under 6 weeks.

Step 1
p=none
2–3 Weeks
Monitor Only

Collect DMARC reports from all providers. Discover every sender using your domain. Identify which senders need authentication fixes — without affecting delivery.

  • Start receiving aggregate reports
  • Map all sending sources
  • Fix authentication on all legitimate senders
  • Reach 99%+ pass rate before escalating
Step 2
p=quarantine
2–3 Weeks
Quarantine Failing Mail

Failing emails — including spoofed and phishing attempts — are routed to spam instead of the inbox. Use pct= to roll out gradually: 10% → 25% → 50% → 100%.

  • Phishing emails quarantined
  • Monitor for legitimate mail failures
  • pct= rollout from 10% to 100%
  • Escalate to p=reject when ready
Step 3
p=reject
Ongoing
Full Enforcement

Emails failing DMARC are rejected at the SMTP level — never delivered, never seen. Your domain is fully protected against spoofing. BIMI logo display becomes available.

  • Complete domain spoofing protection
  • BIMI logo display in Gmail/Yahoo
  • Google Verified Sender eligibility
  • Ongoing monitoring continues
Sender Source Discovery

Who Is Sending Email
as Your Domain — Authorised and Not

DMARC aggregate reports reveal the complete picture of your domain's email ecosystem. Many companies are surprised to find old ESPs, forgotten CRM automations, and active spoofing attempts all sending under their domain simultaneously.

Authorised Senders
Correctly authenticated — DMARC pass
3 sources
Migomail (Primary ESP)
Email marketing · 167,420 msgs/mo
100% pass
Google Workspace
Internal staff email · 58,340 msgs/mo
100% pass
Salesforce CRM
Automated notifications · 41,280 msgs/mo
100% pass
Needs Attention
Misconfigured or unauthorised — DMARC fail
2 sources
Legacy SendGrid Account
Old transactional config · 12,190 msgs/mo · DKIM not set up
Fix: add DKIM + SPF include
Unknown IP 185.23.x.x
No rDNS · not in SPF · 1,730 attempts · spoofing indicator
Action: investigate + block at p=reject
How It Works

From DNS Record to
Full Domain Protection in 5 Steps

Setup takes under 15 minutes. Migomail handles everything after that — report processing, source classification, policy guidance, and continuous monitoring.

01
Add DMARC Record
Add a single TXT record to your DNS: _dmarc.yourdomain.com pointing to Migomail's reporting endpoint. Migomail generates the exact record value — you copy and paste it into your DNS provider.
02
Reports Flow In
Within 24 hours, aggregate reports begin arriving from Gmail, Outlook, Yahoo, and all other providers. Migomail receives and processes each XML report automatically.
03
Sources Identified
The dashboard populates with every source sending email as your domain — classified as authorised, misconfigured, or unauthorised. Each source gets a fix recommendation.
04
Fix & Escalate
Work through the fix list — adding missing DKIM, SPF includes, or blocking unauthorised sources. Migomail tracks your pass rate and signals when it's safe to escalate policy.
05
p=reject — Protected
Reach p=reject with confidence. Every spoofed email using your domain is rejected before delivery. Ongoing monitoring continues with alerts for new sources and anomalies.
Before & After Hosted DMARC

What Changes When You Move
from No DMARC to p=reject

Measured outcomes from Migomail Hosted DMARC customers — 90-day before/after comparison.

✗ Before (No DMARC / p=none)
Metric
✓ After (p=reject · 90 days)
Before
Unlimited — not visible
Domain Spoofing Attempts Reaching Inboxes
After
0 — all rejected at SMTP
Before
Unknown — no visibility
Unauthorised Senders Identified
After
100% of sources mapped
Before
0% enforced
DMARC Policy Enforcement
After
100% at p=reject
Before
Ineligible
BIMI Logo Display (Gmail/Yahoo)
After
Eligible immediately
Before
Not available
Google Postmaster Domain Reputation Boost
After
Medium → High within 30 days
Before
Manual process
Aggregate Report Processing
After
Fully automated daily
< 6wks
Avg time to p=reject
99.4%
Avg DMARC pass rate
4,000+
Spoofed emails blocked/mo
4.9★
Customer Rating
What Security Teams Say

From IT Managers, DPOs, and
Email Security Teams on Migomail

★★★★★

Before Hosted DMARC we had no idea our old SendGrid account from 2019 was still sending 12,000 emails a month as our domain — completely unauthenticated. It showed up in the first DMARC report. Within 48 hours of getting the source discovery view, we had fixed 3 legacy senders we didn't even know existed. Six weeks later we were at p=reject. The ROI in terms of brand protection alone justified the cost immediately.

Karthik Iyer
IT Security Manager, Fintech
★★★★★

The compliance reporting is what made this essential for us. Our ISO 27001 audit required documented evidence of domain authentication controls — specifically that we know every source sending email as our domain, that failing sources are enforced against, and that we have continuous monitoring in place. Migomail's Hosted DMARC generated a single exportable report that covered all three requirements. Our auditor accepted it without any supplementary documentation. Without this, we would have spent days pulling together DNS screenshots and raw XML files.

Pradeep Nambiar
Head of IT Compliance, Enterprise SaaS

Ready to See Who's Sending Email as Your Domain?

Setup takes 15 minutes. Your first DMARC aggregate reports arrive within 24 hours. Most customers reach p=reject within 6 weeks.

star-1
star-2
Hero image

“Rackwave Technologies has significantly improved our marketing performance while providing reliable cloud services. We’ve been using their solutions for a while now, and the experience has been seamless, scalable, and results-driven.”

David Larry

Founder & CEO

Have a question or feedback? Fill out the form below, and we'll get back to you as soon as possible.

Sending your message…

Trusted for overall simplicity

Based on 400+ reviews with customer satisfaction on
Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot
FAQ

Frequently Asked Questions

Common questions about Hosted DMARC and email authentication.

  • What is Hosted DMARC and how is it different from just adding a DMARC DNS record?

    A standard DMARC record points the rua= (aggregate report) address to a mailbox you own. The problem: DMARC reports are sent as XML email attachments from dozens of providers simultaneously — often hundreds of reports per day for high-volume senders. Reading, parsing, and acting on raw XML is impractical without tooling. Hosted DMARC means Migomail receives those reports on your behalf, parses them, presents the data as a human-readable dashboard, classifies every sender source, and alerts you to problems. The DNS record still lives on your domain — the difference is where the reports go and who processes them.

  • How long does DMARC setup take?

    Adding the DNS record takes 5–15 minutes depending on your DNS provider. Migomail generates the exact TXT record value — you copy and paste it. After that, DMARC reports begin arriving within 24 hours (Google sends reports daily; most other providers send them within 24–48 hours). Your source discovery dashboard populates as reports arrive over the first 2–3 days.

  • Will DMARC break any of my existing emails?

    At p=none (the starting policy), DMARC has zero impact on delivery — it only generates reports. At p=quarantine and p=reject, emails that fail DMARC authentication are affected. This is why Hosted DMARC starts at p=none: you spend 2–3 weeks identifying every legitimate sender and fixing their authentication before escalating to enforcement. Migomail tracks your authentication pass rate and only recommends escalating when the pass rate is above 99% for at least 7 consecutive days.

  • What are DMARC aggregate reports (RUA) and what information do they contain?

    DMARC aggregate reports (RUA — Reporting URI for Aggregate reports) are XML files sent by mailbox providers (Gmail, Outlook, Yahoo, etc.) to your DMARC reporting address. Each report covers a 24-hour period and contains: the provider sending the report, each IP address that sent email claiming to be from your domain, the volume of messages from each IP, the DKIM result for each source (pass/fail), the SPF result for each source (pass/fail), and the DMARC disposition (delivered/quarantined/rejected). The reports are factual delivery data from the provider — not estimates.

  • What is the difference between DMARC p=none, p=quarantine, and p=reject?

    p=none: Report only — failing emails are delivered normally. Zero enforcement, maximum visibility. p=quarantine: Failing emails are sent to the spam/junk folder. Partial enforcement — phishing and spoofed emails are deprioritised but still potentially visible to recipients. p=reject: Failing emails are rejected at the SMTP level — the sending server receives a 550 rejection code and the email is never delivered. Complete enforcement — spoofed emails using your domain cannot reach your customers. p=reject is the target for every domain owner.

  • Does Hosted DMARC cover all of my subdomains?

    By default, a DMARC policy at the organisational domain (yourbrand.com) applies to the domain itself. Subdomains are covered by the sp= (subdomain policy) tag in your DMARC record. Migomail configures both the main domain policy and the subdomain policy, and the dashboard shows source data separately for each subdomain that appears in your reports.

  • What is BIMI and how does Hosted DMARC enable it?

    BIMI (Brand Indicators for Message Identification) displays your brand logo next to your emails in Gmail and Yahoo inbox list views. For Gmail BIMI, your domain must have DMARC at p=reject with pct=100, plus a Verified Mark Certificate (VMC). For Yahoo BIMI, a VMC is optional. Hosted DMARC tracks your BIMI readiness at every stage — showing when you reach p=reject eligibility and what remaining steps are needed for the VMC application.