TL;DR
DKIM adds a cryptographic signature to your outgoing emails.
At HostBible, we handle DKIM automatically for our Web Hosting customers — we sign your mail and publish/rotate the public keys. No action needed on your side for DKIM when you use our standard setup.DMARC is a policy you (the domain owner) publish in DNS to tell receivers how to handle mail that fails SPF/DKIM alignment and where to send reports.
DMARC policy is your responsibility. We don’t set it by default because enforcement depends on your business needs and all the services that send on your behalf.To start, add a DNS TXT record at
_dmarc.yourdomain.comwith a monitoring policy, then move to enforcement as you gain confidence (examples below).
What is DKIM?
DomainKeys Identified Mail (DKIM) attaches a digital signature to each message. Receivers verify the signature using a public key published in your DNS. If the signature checks out, the message is proven to be authorized by your domain.
How HostBible handles DKIM
For HostBible Web Hosting customers using our standard mail routing, we automatically sign outgoing mail and publish/rotate the required DKIM DNS records for your domain.
If your DNS is hosted elsewhere or you’ve made custom changes, contact Support and we’ll confirm DKIM is active for your domain (and provide any record details if needed).
If you add other email platforms (e.g., Microsoft 365, Google Workspace, a marketing tool), enable DKIM in those platforms as well so their messages pass DMARC through DKIM alignment.
What is DMARC?
Domain-based Message Authentication, Reporting & Conformance (DMARC) lets you publish a policy telling receivers:
How to treat mail that fails SPF or DKIM alignment with your From: domain (
p=none | quarantine | reject).Where to send reports so you can see who is sending using your domain (
rua=for aggregate, optionalruf=for forensic).
Alignment means the SPF/DKIM domain matches (or is within) the domain shown to users in the From: header. A message can pass DMARC if either aligned SPF or aligned DKIM passes (both is even better).
How to create your DMARC record (you own this)
Record type: TXT
Name/Host: _dmarc (this makes _dmarc.yourdomain.com)
TTL: ~1 hour (3600) is a good default
Value: one of the examples below
Step 1 — Start in monitor mode (collect data)
Create a TXT record on _dmarc.yourdomain.com:
v=DMARC1; p=none; rua=mailto:[email protected]
p=noneasks receivers to deliver normally but send aggregate reports torua.Use a monitored mailbox (or a DMARC report service). Reports are XML and can be large.
Step 2 — Move to partial enforcement
After 2–4 weeks of clean reports (all legitimate sources passing alignment):
v=DMARC1; p=quarantine; pct=50; rua=mailto:[email protected]; adkim=s; aspf=s
p=quarantineasks receivers to spam-folder mail that fails DMARC.pct=50applies enforcement to 50% of failing mail (ease in).adkim=sandaspf=sset strict alignment (exact-domain match). You can keep defaults (relaxed) if needed.
Step 3 — Full enforcement
When you’re confident everything legitimate passes alignment:
v=DMARC1; p=reject; rua=mailto:[email protected]; adkim=s; aspf=s
p=rejectasks receivers to reject mail that fails DMARC.Keep
ruaso you continue to see attempts and any misconfigurations.
Optional tags you might use
ruf=mailto:[email protected]– request forensic (failure) samples. Not all receivers send these; they may contain message excerpts, so use with care.fo=1– request forensic reports on any SPF/DKIM failure that contributes to DMARC fail.sp=– apply a different policy to subdomains (e.g.,sp=quarantine).pct=– enforce policy on a percentage of mail (good for gradual rollout).
Exactly one DMARC record per domain. If you already have one, edit/merge rather than creating a second.
Choosing a DMARC rollout plan
Inventory senders: HostBible (handled), plus any others (M365, Google Workspace, CRM, marketing, ticketing, etc.).
Enable DKIM (and SPF) on each sender so it can pass DMARC.
Start with
p=noneand review reports for 2–4 weeks.Enforce gradually:
p=quarantinewithpct=25→50→100, then move top=reject.Keep monitoring even after full enforcement.
Examples for common scenarios
HostBible only
v=DMARC1; p=none; rua=mailto:[email protected]
Move to p=reject once you verify your mail flow.
HostBible + Microsoft 365
Ensure DKIM is enabled in Microsoft 365 for your domain.
Then use:
v=DMARC1; p=quarantine; pct=50; rua=mailto:[email protected]; adkim=s; aspf=s
Apply a different policy to subdomains
If you send from subdomains (e.g., news.yourdomain.com) and want a softer policy there:
v=DMARC1; p=reject; sp=quarantine; rua=mailto:[email protected]; adkim=s; aspf=s
Automatic management (what we do vs. what you do)
DKIM (HostBible: we do it)
For Web Hosting customers using our standard setup, we automatically sign outbound mail and publish/rotate the public keys. No additional action is required on your side for DKIM.DMARC (you do it)
Because DMARC is a policy decision for your domain, you must create and manage the_dmarcTXT record. We’re happy to advise on values and review your rollout plan.
If your DNS is hosted outside HostBible or you use additional outbound services, we can help you confirm alignment and consolidate everything into a safe, enforceable DMARC policy.
Best practices & pitfalls
One DMARC TXT per domain — duplicates cause failures.
Use a working
ruamailbox (or a DMARC reporting service).Don’t rush to
p=rejectuntil all legitimate senders pass alignment.Forwarding can break SPF; DKIM is more resilient. Prefer DKIM where possible.
Keep it simple: only add tags you need.
Test changes with DNS lookups:
nslookup -type=txt _dmarc.yourdomain.comdig txt _dmarc.yourdomain.com +short
FAQ
Do I need a DMARC record if HostBible manages DKIM?
Yes. DKIM proves your mail is authorized; DMARC tells receivers what to do with mail that isn’t. DMARC also gives you visibility via reports.
Will HostBible create my DMARC record for me?
We don’t publish DMARC by default because it’s a policy for your domain. We can provide recommended values and help you implement it with your DNS host.
Should I set adkim=s and aspf=s?
Strict alignment is safest but can surface misconfigurations. Many start with relaxed alignment (defaults) and tighten later.
What email address should I use for rua?
Create a dedicated mailbox or use a DMARC report service. You can list multiple addresses separated by commas:
rua=mailto:[email protected],mailto:[email protected]
Need help?
Not sure which policy to choose, or seeing failures in your DMARC reports? Contact HostBible Support. We’ll review your sender inventory, confirm DKIM/SPF alignment, and propose a safe path to enforcement.
