SlideShare a Scribd company logo
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
TrustYourInbox
Secure Your Brands Identity
Dinesh Mistry
Founder & CEO
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
What Is DMARC?
● Technical Specification
● How to make email easy to identify using free and open technology
● Provides the ability for Email Receivers to consistently check the
identity of an email message
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
DMARC Builds On SPF & DKIM
Two ways to identify Email Authentication
● Sender Policy Framework (SPF)
○ Where Email comes from
○ “Path Based”
● Domain Keys Identified Mail (DKIM)
○ Content of Email
○ “Signature Based”
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
Authenticated Identifiers
● SPF & DKIM can associate a piece of email with a domain
● The stable, domain-level identifiers that SPF & DKIM produce are
called “Authenticated Identifiers”
● DMARC ties together Authenticated Identifiers with the domain found
in the FROM: header of an email
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
DMARC Builds On SPF & DKIMHow To Accurately Deploy SPF & DKIM
● DMARC provides new feedback to domain owners
● Domain owners can now see how their domains are being used
from the perspective of the receivers
● This makes accurate deployments of SPF and DMARC possible
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
Forensic Report Notes (RUF)
Forensic Reports are often not provided
1. Privacy Concerns
2. Potentially Very High Volumes
3. Reports not needed to deploy DMARC
You have to explicitly ask for forensic reports, often not asked for
to avoid potential privacy issues
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
The DMARC Policy
Receivers will enforce policy against unauthenticated email
● none – (Monitor Mode, No Enforcement)
● quarantine – Deliver to the “spam” folder
● reject – Do not deliver and discard email message
.
The “pct” tag allows for slow roll out
.
● “pct=20” means apply policy to 20% of unauthenticated email
● If policy is NOT applied due to pct tag, “next lesser” policy is applied
©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary
Big Improvement In Email Security
With DMARC in place
● FAKE Email can be rejected
● Delivered is simplified
● Building blocks of email domain reputation

More Related Content

PDF
GoDMARC - Block Email Phishing
PPTX
Jak ochránit vaší značku a doménu s technologií DMARC
PDF
Neuailes Global Technologies Pvt Ltd
PPTX
GoDMARC – India’s First EMAIL SECURITY SOFTWARE
PDF
Protect your domain with DMARC
PPTX
Presentation_Mimecast Email Security (1).pptx
PDF
Presentation cisco iron port email & web security
PPTX
weDMARC: Reinventing Email Security for the Modern Era
GoDMARC - Block Email Phishing
Jak ochránit vaší značku a doménu s technologií DMARC
Neuailes Global Technologies Pvt Ltd
GoDMARC – India’s First EMAIL SECURITY SOFTWARE
Protect your domain with DMARC
Presentation_Mimecast Email Security (1).pptx
Presentation cisco iron port email & web security
weDMARC: Reinventing Email Security for the Modern Era

Similar to TrustYourInbox: What is DMARC? (20)

PDF
DMARC Implementation across all domains
PDF
Powerful email protection
PDF
DMARC Overview
PDF
Cisco Secure Email 2024 Cisco Secure Email 2024
PPTX
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
PDF
Strategies for Seamless Recovery in a Dynamic Data Landscape
PPTX
Understanding Email Deliverability: Key Factors & Key Performance Indicators
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
PDF
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
PPTX
Fix Nix deck
PPTX
Protect passwords - User Awareness Training
PPTX
Cloud data security and GDPR compliance
PDF
Privacy-preserving user identity in Identity-as-a-Service
PDF
MikroTik Security
PPTX
Video - FortiMail and FortiMail Cloud - April 2021.pptx
PPTX
Top 8 Features of an Effective Email Security Solution.pptx
PPTX
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
PDF
Getting startedwithdmarc5
PPTX
NetSuite Email Campaigns Best Practices for Delivering Results
PDF
premium-seller-package (1).pdf
DMARC Implementation across all domains
Powerful email protection
DMARC Overview
Cisco Secure Email 2024 Cisco Secure Email 2024
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
Strategies for Seamless Recovery in a Dynamic Data Landscape
Understanding Email Deliverability: Key Factors & Key Performance Indicators
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
GDPR Compliance: Transparent Handing of Personally Identifiable Information i...
Fix Nix deck
Protect passwords - User Awareness Training
Cloud data security and GDPR compliance
Privacy-preserving user identity in Identity-as-a-Service
MikroTik Security
Video - FortiMail and FortiMail Cloud - April 2021.pptx
Top 8 Features of an Effective Email Security Solution.pptx
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Getting startedwithdmarc5
NetSuite Email Campaigns Best Practices for Delivering Results
premium-seller-package (1).pdf
Ad

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Ad

TrustYourInbox: What is DMARC?

  • 1. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary TrustYourInbox Secure Your Brands Identity Dinesh Mistry Founder & CEO
  • 2. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary What Is DMARC? ● Technical Specification ● How to make email easy to identify using free and open technology ● Provides the ability for Email Receivers to consistently check the identity of an email message
  • 3. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary DMARC Builds On SPF & DKIM Two ways to identify Email Authentication ● Sender Policy Framework (SPF) ○ Where Email comes from ○ “Path Based” ● Domain Keys Identified Mail (DKIM) ○ Content of Email ○ “Signature Based”
  • 4. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary Authenticated Identifiers ● SPF & DKIM can associate a piece of email with a domain ● The stable, domain-level identifiers that SPF & DKIM produce are called “Authenticated Identifiers” ● DMARC ties together Authenticated Identifiers with the domain found in the FROM: header of an email
  • 5. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary DMARC Builds On SPF & DKIMHow To Accurately Deploy SPF & DKIM ● DMARC provides new feedback to domain owners ● Domain owners can now see how their domains are being used from the perspective of the receivers ● This makes accurate deployments of SPF and DMARC possible
  • 6. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary Forensic Report Notes (RUF) Forensic Reports are often not provided 1. Privacy Concerns 2. Potentially Very High Volumes 3. Reports not needed to deploy DMARC You have to explicitly ask for forensic reports, often not asked for to avoid potential privacy issues
  • 7. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary The DMARC Policy Receivers will enforce policy against unauthenticated email ● none – (Monitor Mode, No Enforcement) ● quarantine – Deliver to the “spam” folder ● reject – Do not deliver and discard email message . The “pct” tag allows for slow roll out . ● “pct=20” means apply policy to 20% of unauthenticated email ● If policy is NOT applied due to pct tag, “next lesser” policy is applied
  • 8. ©2020 TrustYourInbox, Inc. All Rights Reserved. Confidential and Proprietary Big Improvement In Email Security With DMARC in place ● FAKE Email can be rejected ● Delivered is simplified ● Building blocks of email domain reputation