How to Read a DMARC Report (Step-by-Step for B2B Senders)
Learn how to read a DMARC report, interpret SPF, DKIM, and DMARC results, spot abuse, and fix authentication issues before deliverability drops.
Learn how to read a DMARC report, interpret SPF, DKIM, and DMARC results, spot abuse, and fix authentication issues before deliverability drops.

Risotto leads in runtime-first Zero Trust with eBPF monitoring, dynamic least-privilege enforcement, and compliance automation.
Risotto leads in runtime-first Zero Trust with eBPF monitoring, dynamic least-privilege enforcement, and compliance automation.
Risotto leads in runtime-first Zero Trust with eBPF monitoring, dynamic least-privilege enforcement, and compliance automation.
A DMARC aggregate report is a summary sent by mailbox providers that shows how email claiming to be from your domain performed against authentication checks like SPF and DKIM.
These reports are essential for understanding who is sending email on your behalf, the volume of emails being sent, and whether that email is passing authentication. They are the primary source of truth for identifying legitimate senders, misconfigurations, and potential abuse.
However, even experienced IT administrators often struggle to interpret DMARC reports. The data is dense, highly technical, and difficult to translate into clear, actionable steps for improving email deliverability and security.
For non-technical teams, the challenge is even greater. The reports are delivered in XML format and provide little guidance on what actually matters or what to fix first.
In this guide, we break down DMARC aggregate reports into practical components, explain what to focus on, and show how to turn the data into meaningful actions to improve email performance.

The DMARC standard defines two types of reports. However, only one of them is consistently available and useful for most B2B teams responsible for email deliverability.
DMARC aggregate reports (RUA) are the primary reports you will work with.
They are sent daily by mailbox providers and provide a domain-level summary of all email activity observed during a given time window. Each report groups messages by sending source and shows authentication outcomes for SPF, DKIM, and DMARC.
Mailbox providers such as Google and Microsoft consistently provide aggregate reports. As a result, they form the foundation of DMARC monitoring and are the primary focus of this guide.
DMARC forensic reports (RUF) are designed to provide message-level detail when authentication fails.
In reality, they are rarely available. Many mailbox providers no longer send them or heavily redact data due to privacy constraints. Support varies widely, and most B2B domains never receive forensic reports even when they are requested.
As a result, most teams rely almost entirely on aggregate reports for ongoing monitoring and decision-making.
A DMARC aggregate report is a structured summary of email activity associated with your domain over a defined period. These reports are intentionally limited in scope. They do not show individual messages, content, or recipients. Instead, they focus on high level authentication signals that mailbox providers are willing to share at scale.
Since the reports are delivered as XML files, they are not intended for manual review. Most teams rely on parsing tools or DMARC platforms to make the data readable. This limitation is also why aggregate reports are favored by mailbox providers. They balance visibility with privacy and are consistently supported across major providers.
At a structural level, every DMARC aggregate report contains the same core components.
This identifies the mailbox provider that generated the report. Common reporting organizations include Google and Microsoft. Each provider sends its own report based on the traffic it observed for your domain.
The report covers a specific time window, usually a 24 hour period. This lets you track authentication behavior day by day and spot changes over time rather than isolated events.
Sending sources are listed at the IP address level. Each source represents a server that sent email using your domain during the reporting period.
For each sending source, the report includes the number of messages observed, providing the visibility into the volume of emails sent by each IP on behalf of your domain during the specified time range.
Each sending source includes authentication outcomes based on three mechanisms.
o SPF results show whether the sending server was authorized to send emails on behalf of the domain.
o DKIM results show whether messages were cryptographically signed and whether the signing domain aligned with the visible From domain.
o DMARC disposition shows how the mailbox provider handled messages based on your published DMARC policy.
DMARC aggregate reports are delivered as XML files. Although they may appear technical, it is not necessary to understand every tag to derive meaningful insights from them.
Here is a simplified example of a DMARC aggregate report for example.com.
You do not need to read this line by line. Instead, apply the following four step scan every time.
Look for the <source_ip> field in each record.
In this example, three IP addresses sent emails using example.com. Each IP represents a sending system observed by the mailbox provider. At this stage, your only task is recognition. Ask whether the IP belongs to a known source such as Google Workspace, Microsoft 365, a sales outreach tool, or a marketing platform.
Next, look at the <count> value for each source.
Volume helps you prioritize attention. High-volume sources matter more than low-volume sources. A single unknown IP sending thousands of emails deserves immediate investigation. A few messages may simply indicate background spoofing attempts.
When reviewing a DMARC aggregate report, you are answering three core questions for each sending source. Each one maps directly to a specific XML tag in the report.
Now look at the authentication outcomes inside <policy_evaluated>.
You are not diagnosing root causes yet. You are simply observing outcomes:
• Did SPF pass?
SPF results appear in the <policy_evaluated> block under the <spf> tag. If the report shows <spf>fail</spf>, SPF validation failed. The sending IP was not authorized by your domain’s SPF record at the time the message was evaluated.
If it shows <spf>pass</spf>, the sending server was authorized to send email on behalf of the domain.
• Did DKIM pass?
DKIM results appear under the <dkim> tag in the same block. A value of <dkim>pass</dkim> means the message was correctly signed and the signature aligned with the visible From domain.
A value of <dkim>fail</dkim> means the message was not properly signed, the signature was invalid, or domain alignment failed.
• Did DMARC evaluate it as compliant?
DMARC’s final decision appears in the <disposition> tag. A value of <disposition>none</disposition> means no enforcement was applied, which is typical when a domain is in monitoring mode.
Values such as quarantine or reject indicate that the message failed DMARC evaluation and that enforcement was applied according to the published policy.
These three tags answer the third step of the framework you saw earlier. Once you know who sent the email and how much they sent, SPF, DKIM, and disposition tell you whether that activity was authenticated and how mailbox providers treated it.
Finally, combine identity, volume, and authentication results.
This is where raw XML becomes an actionable signal.
Once you understand who sent the email and the volume sent, the next step is to interpret the authentication results. This is where DMARC reports become useful for decision making.
Authentication results help mailbox providers decide whether an email is reliable. Your job is to understand what these signals mean and how to read them.
Sending sources and volume trends
Each row in a DMARC report represents a group of messages from a specific IP. Volume trends matter because mailbox providers build reputation gradually. Sudden spikes often indicate misconfigurations, new tools, or abuse.
Low but recurring volume from unknown IPs usually signal domain spoofing attempts.
SPF results
SPF verifies whether a sending IP is authorized to send email on behalf of your domain.
SPF failures are common and not always a problem. They frequently occur due to forwarding, incomplete records, or tools that rely on DKIM instead.
An SPF failure becomes a concern when it repeats at scale or combines with DKIM failures.
DKIM results
DKIM verifies message integrity and domain alignment. It is the strongest authentication signal for B2B deliverability because it survives forwarding and is heavily trusted by Google and Microsoft.
For most B2B senders, consistent DKIM checks and alignment across all tools is non-negotiable.
DMARC policies define how mailbox providers should handle emails that fail authentication checks. These outcomes appear in aggregate reports as the final disposition for each sending source.
These policies manage risk exposure, not inbox placement. They control what happens to unauthenticated emails, not whether authenticated emails land in the inbox.
DMARC policies reduce exposure to spoofing and unauthorized use of your domain. They do not improve engagement, sender reputation, or inbox placement on their own.
Authentication establishes legitimacy. Deliverability is determined by reputation and behavior over time.
Once you understand authentication results, the next step is deciding which sending sources are trustworthy and which ones require attention.
This determination is rarely based on a single signal. Unknown IPs or isolated authentication failures do not, by themselves, indicate abuse. Confidence is established through patterns observed over time, particularly when volume and repetition are present.
A good way to work through DMARC reports is to tag each row into one of three categories.
This simple classification keeps DMARC review efficient and prevents unnecessary changes that could disrupt legitimate email flow.
DMARC aggregate reports tend to show the same combinations of authentication results over time. These combinations are useful because they point to likely causes, not guaranteed ones.
Mailbox providers evaluate authentication slightly differently, and sending paths can vary based on forwarding, gateways, and tooling. The patterns below should be read as diagnostic shortcuts, not absolute conclusions.
DMARC reports point to exact email setup problems. Fix the biggest issues first, then work through others step by step.
Start with big problems
DMARC reports arrive daily. Not every issue needs immediate action. Watch trends over multiple days to separate normal changes from high-impact problems.
DMARC proves legitimacy. It does not earn trust.
Mailbox providers ultimately reward behavior like positive user engagement, consistency, and reputation over time. This is where many teams stall. They fix authentication, see everything pass, and still experience spam placement.
That’s expected.
Authentication removes blockers. Reputation drives outcomes.
MailReach complements DMARC by handling the layer DMARC cannot influence. Gradual email warmup generates engagement signals that train Google and Microsoft to trust your sending behavior. Spam testing surfaces content and formatting risks before they damage reputation. Continuous monitoring ensures technical issues don’t quietly erode deliverability.
DMARC clears the path. MailReach builds the trust that gets emails read, and replied to.
Every email in spam equals to a lost potential customer. Start improving your inbox placement today with MailReach spam testing and warmup.
Following the rules isn’t enough—know where your emails land and what’s holding them back. Check your spam score with our free test, and improve deliverability with MailReach warmup.

How to Read a DMARC Report (Step-by-Step for B2B Senders)

What is an email service provider and how to choose the right one?

A cold email domain isn’t optional in 2026. Here’s why you need one and exactly how to set it up for success.

What is Email List Hygiene and Why it Matters in 2026

Discover the basics of email authentication with SPF, DKIM, and DMARC. Learn how to implement these protocols for secure email communication.

Your domain reputation has a direct impact on your email deliverability. Our tips to understand your domain reputation and improve it !