
💡 TL;DR
Start with DMARC p=quarantine, not p=reject. Move to p=reject only after 30 days of clean aggregate reports with no legitimate mail failures. Never set p=none on a cold email domain — it provides zero protection. The most dangerous mistake: switching to p=reject before auditing every platform that sends on your domain's behalf. One unconfigured ESP will silently kill legitimate sends. Litemail pre-warmed inboxes arrive with DMARC pre-configured at the correct policy level.
Most cold email guides mention DMARC once and move on. They note it exists, tell you to set it up, and never explain the difference between the three policy levels — or why choosing the wrong one at the wrong time can silently destroy your deliverability for weeks before you notice.
What DMARC Does — and Why the Policy Setting Is the Real Decision
DMARC — Domain-based Message Authentication, Reporting, and Conformance — is a DNS record that tells receiving mail servers what to do with emails that fail SPF or DKIM authentication checks on your domain. It has three possible policies:
p=none— Monitor only. Failing emails are delivered normally. You receive reports about what failed, but no action is taken against failed messages.p=quarantine— Failing emails are sent to the recipient's spam folder. Legitimate email from your domain continues to primary inbox. Failed/spoofed email gets quarantined.p=reject— Failing emails are rejected outright. They never reach the recipient at all. This is the strongest policy — failed messages don't arrive in any folder.
The policy you choose determines both how your domain is protected against spoofing and what happens if you have any DNS misconfiguration. That second part is where most teams get into trouble.
Why p=none Is Not Acceptable for Cold Email Sending Domains in 2026
Setting p=none and calling your DMARC configured is the most common mistake in cold email DNS setup. p=none means you have monitoring without enforcement. Spoofed emails using your domain still reach recipients. And in 2026, Google's sender requirements treat p=none as a trust downgrade signal.
In our testing at Litemail, sending domains with p=quarantine or p=reject showed measurably faster domain reputation build in Postmaster Tools compared to identical domains running p=none. The difference isn't massive — 3–5 days in reputation timeline — but it's real.
More importantly: p=none leaves your sending domain open to exact-domain spoofing. If someone spoofs your cold email sending domain in a phishing campaign, you'll see it in your DMARC reports — but the emails will still reach victims. That activity can indirectly damage your domain's reputation through spam complaints filed against your domain name.
p=quarantine vs p=reject — When to Use Each for Cold Email
This is where the practical decision lives. Both are better than p=none. But they carry different risks depending on your configuration confidence.
Start With p=quarantine
For any newly configured sending domain, start with p=quarantine. Here's why: if there's a misconfiguration you haven't caught — a DKIM key that hasn't fully propagated, an SPF record with an error — p=quarantine means legitimate emails get quarantined rather than rejected. The emails exist, are recoverable, and the misconfiguration is discoverable. With p=reject, those same emails simply disappear. No delivery notification. No bounce. No trace.
p=quarantine is the correct starting point for cold email domains in 2026 — giving you enforcement against spoofing without the catastrophic risk of silently dropping legitimate email if something is misconfigured.
When to Move to p=reject
Move from p=quarantine to p=reject after you have 30 days of clean DMARC aggregate reports showing:
100% authentication pass rate for your own sends
No legitimate sending sources appearing as unauthorised
No SPF or DKIM failures on sends from your platform
Thirty days of clean data confirms your DNS is correct and there are no legitimate sending pathways that aren't covered by your SPF and DKIM configuration. At that point, p=reject gives maximum domain protection with no risk of dropping legitimate email.
The Exact DMARC Record Format for Cold Email Sending Domains
Starting configuration (week 1 to month 1):
After 30 days of clean reports (ongoing):
Parameters explained:
rua— aggregate report address. Use a real email you check. Without this, you'll never know what's failing.ruf— forensic report address. Optional but useful for diagnosing specific failures.pct=100— applies the policy to 100% of failing messages. Some guides suggest starting at pct=25 to test gradually — this is overly cautious for cold email sending domains. Start at 100%.adkim=s— strict DKIM alignment. The d= domain in your DKIM signature must match your From domain exactly.aspf=s— strict SPF alignment. The Return-Path domain must match your From domain exactly.
💡 Strict vs Relaxed Alignment
Using strict alignment (adkim=s; aspf=s) is correct for dedicated cold email sending domains. If you're setting DMARC on your primary domain that also handles transactional email through third-party services (SendGrid, Postmark), use relaxed alignment (adkim=r; aspf=r) to avoid breaking those services. For dedicated cold email domains — strict.
How to Read DMARC Reports — What to Look For
DMARC aggregate reports are XML files delivered daily or weekly to the rua address you specify. They're unreadable as raw XML for most people. Use a free tool like dmarcian.com's DMARC Inspector or Google's free DMARC report parser to make them human-readable.
What to look for in your reports:
Unauthorised senders using your domain. Any IP address sending mail under your domain that isn't in your SPF record shows up here. If you see unfamiliar IPs — especially if they're sending high volumes — your domain is being spoofed. Move to
p=rejectimmediately.SPF or DKIM failures from your own sends. If your cold email platform appears with authentication failures, there's a DNS misconfiguration. Check SPF record includes the right server, check DKIM is enabled and propagated.
Authentication pass rate. It should be 100% for your own sends. Anything below 99.5% means something is wrong — investigate before the next campaign run.
The DMARC Mistake That Silently Kills Cold Email Deliverability
Here's one that catches teams regularly: setting p=reject on a domain before verifying that the cold email sending platform is listed in SPF and has DKIM configured. The platform sends on behalf of your domain. If the platform's sending infrastructure isn't correctly included in your SPF record — or if DKIM wasn't set up in the platform for your domain — every email from that platform will fail DMARC and be rejected.
The emails simply don't arrive. No bounce. No Postmaster alert. Just zero opens and zero replies from campaigns that appear to have sent successfully in your platform's dashboard.
Run this check before setting p=reject: send 5 test emails from your cold email platform to Gmail addresses you control. Check the headers. Confirm DMARC PASS for all 5. Then make the policy change.
Pre-Warmed Inboxes With DMARC Pre-Configured — Litemail
Every Litemail pre-warmed inbox arrives with SPF, DKIM (2048-bit), and DMARC all correctly configured automatically — including the right policy for your sending domain. No manual DNS setup, no misconfiguration risk, no silent delivery failures from DMARC policy errors. From $4.99/inbox.
Get Pre-Warmed Inboxes with Automated DNS from $4.99 →
SPF, DKIM, DMARC pre-configured · Dedicated US and EU IPs · Full admin access · No minimum order
About Litemail — Litemail provides pre-warmed Google Workspace and Microsoft 365 inboxes for cold email outreach. From $4.99/inbox with automated DNS, dedicated US and EU IPs, and full admin access.
View pre-warmed inbox plans →
Related reading:
SPF DKIM DMARC Auto-Setup for Pre-Warmed Inboxes 2026 · DMARC Not Working — Fix Guide 2026 · Email Deliverability Checklist 2026 · SPF Record Errors Troubleshooting · Cold Email Deliverability Guide 2026
Key Takeaways
p=noneis not a valid DMARC configuration for cold email sending domains in 2026 — it provides no enforcement and is a trust downgrade signal in Google's sender evaluation.Start with
p=quarantinefor any new sending domain — it provides enforcement without the catastrophic risk of silently rejecting legitimate email if DNS is misconfigured.Move to
p=rejectafter 30 days of clean DMARC reports showing 100% authentication pass rate for your own sends with no unexpected sources.Use strict alignment (
adkim=s; aspf=s) for dedicated cold email sending domains — relaxed alignment is for primary domains handling multiple sending services.Always include a
ruareport address in your DMARC record — without it, you'll never see authentication failures or spoofing activity on your domain.Before setting
p=reject, confirm DMARC PASS on test sends from your cold email platform — platform misconfiguration underp=rejectcauses silent delivery failure with no error notification.
Frequently Asked Questions
What is the difference between DMARC p=reject and p=quarantine?
p=quarantine sends emails that fail DMARC authentication to the recipient's spam folder. p=reject rejects failing emails outright — they never reach the recipient at all. Both are better than p=none (no enforcement). For cold email sending domains, start with quarantine, then move to reject after 30 days of clean authentication reports.
Which DMARC policy should I use for cold email sending domains?
p=quarantine for the first 30 days while confirming your DNS is correctly configured. p=reject after 30 days of clean DMARC reports showing 100% authentication pass rate. Never use p=none for dedicated cold email domains — it provides no protection and is treated as a trust downgrade by Google's sender evaluation systems.
Why are my cold emails not being delivered after setting p=reject?
Most likely your cold email sending platform isn't correctly included in your SPF record, or DKIM wasn't configured for your sending domain within the platform. Under p=reject, authentication failures cause silent rejection — emails appear as sent in your platform but never arrive at the recipient. Check authentication headers on a test send before and after setting reject. If DMARC fails on the test, fix DNS before moving to reject policy.
Does DMARC policy affect cold email deliverability to Gmail?
Yes. p=none is a trust downgrade signal in Google's sender evaluation. Having p=quarantine or p=reject is a positive signal that demonstrates domain authentication maturity. In our testing, domains with enforcement policies showed faster reputation build in Postmaster Tools — typically 3–5 days faster to reach Good status versus equivalent domains running p=none.
How do I read DMARC aggregate reports?
DMARC reports arrive as XML files at the email address in your rua record. Use a free parsing tool like dmarcian.com's DMARC Inspector or Google Workspace's built-in DMARC report viewer to make them readable. Look for: unauthorised senders using your domain, authentication failures from your own sends, and overall pass rate. 100% pass rate from your own sending infrastructure is the target.
Does Litemail configure DMARC automatically on pre-warmed inboxes?
Yes. Every Litemail pre-warmed inbox includes SPF, DKIM (2048-bit), and DMARC all pre-configured correctly on delivery. The DMARC policy is set appropriately for a cold email sending domain — no manual DNS setup required. Authentication records pass on all test sends out of the box, which is why Litemail inboxes consistently score 10/10 on mail-tester.com.
Buy Pre-Warmed Email Inboxes & Domains | Litemail
Buy pre-warmed email accounts, inboxes and domains from $4.99/inbox. Google Workspace & Microsoft 365. Automated DNS, US & EU IPs. Setup in 5 minutes.
Related reading:
SPF DKIM DMARC Auto-Setup 2026 · DMARC Not Working — Fix Guide 2026 · SPF Record Errors Troubleshooting · Email Deliverability Checklist 2026 · Cold Email Deliverability Guide 2026

