Skip to main content
New AI-powered DMARC analysis + open REST API See how → →
Foundational 15 min read

DMARC for Gmail and Google Workspace: The Complete Guide

Brad Slavin
Brad Slavin General Manager

Quick Answer

To set up DMARC for Gmail and Google Workspace, configure SPF with include:_spf.google.com, enable DKIM signing in the Google Admin console under Apps then Gmail then Authenticate email, and publish a DMARC TXT record at _dmarc.yourdomain.com. Google requires all bulk senders (5,000+ messages per day to Gmail) to authenticate with SPF, DKIM, and DMARC since February 2024. Start with p=none to monitor, then enforce after fixing all legitimate senders that fail.

Related: Free DMARC Checker ·How to Create an SPF Record ·SPF Record Format

DMARC for Gmail and Google Workspace: The Complete Guide

Try Our Free DMARC Checker

Validate your DMARC policy, check alignment settings, and verify reporting configuration.

Check DMARC Record →

To set up DMARC for Gmail and Google Workspace, configure SPF with include:_spf.google.com, enable DKIM signing in the Google Admin console, and publish a DMARC TXT record at _dmarc.yourdomain.com. Google has enforced DMARC for bulk senders (5,000+ daily messages to Gmail users) since February 2024. If you send from a Google Workspace domain, proper email authentication is mandatory for reliable delivery.

This hub guide consolidates everything you need to know about DMARC, SPF, and DKIM in the Google ecosystem. Whether you are a Google Workspace administrator configuring authentication for the first time, a bulk sender trying to meet Google’s requirements, or an IT professional troubleshooting delivery issues, start here.

The most common mistake we see during DMARC setup is jumping straight to p=reject without monitoring first, says Vasile Diaconu, Operations Lead at DuoCircle. Start at p=none, analyze your reports for at least a full quarter. You need to catch monthly, quarterly, and annual email senders that only fire periodically. Then fix any legitimate senders that fail before enforcing. We walk every customer through this sequence.

Google’s Email Authentication Requirements

Since February 2024, Google’s sender guidelines require all bulk senders (5,000+ messages per day to Gmail users) to:

  1. Authenticate with SPF AND DKIM for the sending domain
  2. Publish a DMARC policy of at least p=none
  3. Align the From header with the authenticated domain
  4. Support one-click unsubscribe for marketing messages
  5. Keep spam complaint rates below 0.3%

Non-compliant senders face temporary errors (421), spam folder placement, or outright rejection (550). For a full breakdown of these requirements, see our guide on Google and Yahoo’s new email authentication policy and our guide to Google’s guidelines for sending to Gmail users.

For details on the stricter compliance rules specifically targeting Gmail-impersonating From headers, see Google’s new DMARC compliance: stop impersonating Gmail From headers.

Step 1: Configure SPF for Google Workspace

Your SPF record tells receiving servers which IPs are authorized to send email for your domain. For Google Workspace, the record includes Google’s sending infrastructure:

yourdomain.com. IN TXT "v=spf1 include:_spf.google.com -all"

Important considerations:

  • Google’s include:_spf.google.com uses 4 of your 10 allowed DNS lookups (1 top-level + 3 netblock includes). If you also use other email services, monitor your lookup count carefully.
  • Use -all (hard fail) rather than ~all (soft fail) once you are confident all legitimate senders are listed.
  • Only one SPF record per domain. If you send through additional services (SendGrid, Mailchimp, HubSpot), chain the includes in a single record.
yourdomain.com. IN TXT "v=spf1 include:_spf.google.com include:sendgrid.net -all"

Validate your SPF record with our SPF checker tool. For a detailed walkthrough, see our guide on how to configure SPF records for Gmail to prevent email spoofing. If you manage Google Apps specifically, our step-by-step guide to configuring Google Apps SPF records covers the legacy configuration path.

Handling Gmail’s “Best Guess” SPF Status

If you see a “best guess” SPF status in Gmail headers, it means Gmail could not find an SPF record for the sending domain and is guessing at the result. This is not a passing status. Our guide on Gmail’s best guess SPF status explains what causes this and how to fix it.

Step 2: Enable DKIM for Google Workspace

DKIM signing is not enabled by default for custom domains in Google Workspace. You must generate a DKIM key and publish the public key in DNS.

Generate the DKIM Key

  1. Sign in to the Google Admin console
  2. Navigate to Apps > Gmail > Authenticate email
  3. Select your domain
  4. Click Generate new record
  5. Choose your DKIM key length (2048-bit recommended)
  6. Copy the DNS hostname and TXT record value

Publish the DKIM Public Key

Add the TXT record to your DNS with the hostname provided by Google (typically google._domainkey.yourdomain.com). After DNS propagation (up to 48 hours), return to the Admin console and click Start authentication.

For the full walkthrough with screenshots and troubleshooting, see our guide to setting up DKIM in Google Workspace. To learn how to find your DKIM selector and verify the public key, read our guide to finding DKIM selectors and public keys in Google Apps.

Validate your DKIM setup with our DKIM lookup tool.

Diagnosing DKIM Problems

DKIM issues in Google Workspace usually fall into a few categories:

  • DKIM not started. The key was generated but authentication was never activated in the Admin console.
  • DNS record mismatch. The TXT record was published with an incorrect hostname or truncated value.
  • Key rotation not completed. Google rotated the key, but the new public key was not published in DNS.

Our guide on whether your Google Workspace DKIM setup is broken covers the diagnostic steps. For broader DKIM troubleshooting, see troubleshooting DKIM issues for Google Workspace and our general guide on 10 reasons why DKIM fails.

Step 3: Publish Your DMARC Record

With SPF and DKIM configured, publish your DMARC record:

_dmarc.yourdomain.com. IN TXT "v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com"

Always start with p=none. This enables monitoring without affecting email delivery. You will change the policy after analyzing reports. Use our DMARC checker tool to validate the record after publishing.

For Google Workspace-specific DMARC setup guidance, see our dedicated guide on DMARC for Google Workspace: Complete Setup.

Step 4: Verify DMARC Alignment

DMARC passes when EITHER SPF or DKIM passes AND the authenticated domain aligns with the From header domain. In Google Workspace:

  • SPF alignment requires the envelope sender (Return-Path) domain to match the From domain. Google Workspace handles this correctly for direct sending, but third-party services may use their own envelope sender.
  • DKIM alignment requires the d= domain in the DKIM signature to match the From domain. This is why enabling DKIM for your custom domain is critical. Google’s default signature uses google.com, which will not align with your domain.

Our guide on how to verify DKIM alignment with DMARC for Gmail covers the alignment verification process in detail. For a broader look at alignment across both protocols, see how to check if your emails meet DMARC alignment requirements.

Step 5: Monitor and Analyze Reports

Once your DMARC record is live, aggregate reports will arrive within 24-48 hours. These reports reveal which messages pass authentication, which fail, and where they originate.

For Google Workspace domains specifically, our guide on generating and interpreting DMARC aggregate reports for Google Workspace emails walks through what to expect. For general report reading, see our complete guide to DMARC aggregate reports.

Key Metrics to Watch

  • SPF pass rate for messages sent through Google’s infrastructure
  • DKIM pass rate for messages signed with your domain’s key
  • Alignment rate showing how many messages have matching From and authenticated domains
  • Third-party sender compliance for services like marketing platforms, CRM tools, and transactional email providers

Implementing DMARC Policy for Gmail Domains

Setting the right DMARC policy for a Gmail-based domain requires understanding your sending patterns. Our guide on implementing DMARC policy for Gmail and Google Workspace covers the decision framework.

The typical progression:

  1. p=none for at least 90 days of monitoring
  2. p=quarantine with pct=25 to start enforcement gradually
  3. p=quarantine with pct=100 after confirming no legitimate senders are affected
  4. p=reject for full protection

For policy-specific guidance across all platforms, see our DMARC policy guide: from none to reject.

Setting Strict Policies for Gmail Sending Addresses

If your organization sends from @gmail.com addresses (personal Gmail accounts used for business), you face additional constraints. Google owns the gmail.com domain and publishes its own DMARC policy for it. Our guide on best practices for setting strict DMARC policy when sending from Gmail addresses explains the implications and workarounds.

The definitive guide to DMARC policy specifically for Gmail domains is our complete guide to setting DMARC policy for Gmail domains.

Setting Up DMARC Without Breaking Email Delivery

The biggest risk during DMARC deployment on Google Workspace is blocking legitimate email from third-party services that send on your behalf. Our guide on setting up DMARC for Google Workspace without breaking email delivery provides a safe deployment checklist.

Before enforcing, make sure you have authenticated:

  • Marketing automation platforms (Mailchimp, HubSpot, Marketo)
  • CRM systems (Salesforce, HubSpot CRM)
  • Ticketing systems (Zendesk, Freshdesk)
  • Transactional email services (SendGrid, Postmark, Amazon SES)
  • Calendar and scheduling tools
  • Any other service that sends email using your domain in the From header

Troubleshooting Gmail DMARC Issues

Fixing DMARC Errors

If DMARC checks fail for your Gmail or Google Workspace messages, the most common causes are:

  • SPF record missing or misconfigured
  • DKIM not enabled for your custom domain
  • Third-party sender not authenticated
  • Alignment failures between the From header and authenticated domain

Our comprehensive guide on how to fix Gmail DMARC errors and improve email authentication covers each scenario with solutions.

Bounce Messages and DMARC Failures

When a receiving server rejects your message due to DMARC failure, Gmail returns a bounce notification. These bounces contain diagnostic information. Our guide on how to troubleshoot Gmail bounce messages mentioning DMARC failures explains how to read these bounces and take corrective action.

Emails Marked as Spam Under Strict DMARC

Moving to p=quarantine or p=reject can cause legitimate messages to land in spam if authentication is not properly configured. Our guide on why Gmail marks emails as spam under strict DMARC policy identifies the root causes and fixes.

Calendar Invite Issues

Google Calendar invitations can fail DMARC checks in certain configurations. If your calendar invites are being rejected or marked as spam, see our guide on fixing Google Calendar invites that fail DMARC checks.

DMARC Setup Verification for Gmail

To check whether your domain’s DMARC is correctly configured for Gmail delivery, see our walkthrough on how to check your domain’s DMARC setup for Gmail.

Google Postmaster Tools Integration

Google Postmaster Tools provides sender reputation data directly from Google, including spam rate, IP reputation, domain reputation, and authentication results. Pairing Postmaster data with DMARC Report gives you complete visibility into how Google treats your email.

Our guide on enhancing email delivery with Google Postmaster covers setup and interpretation.

Meeting Google’s Bulk Sender Requirements

If you send 5,000+ messages per day to Gmail users, you must comply with Google’s bulk sender requirements. Our guide on setting up DMARC to meet Google’s new requirements for bulk senders provides a compliance checklist.

For European businesses affected by these requirements, see our analysis of Google and Yahoo’s new sender requirements and their impact on European businesses.

Protecting G Suite from Phishing

DMARC protects your domain from being spoofed, but G Suite (now Google Workspace) administrators also need to protect their users from incoming phishing attacks. Our guides cover both angles:

Email Forwarding and Gmail

Email forwarding breaks SPF because the forwarding server’s IP is not in the original domain’s SPF record. This is a common source of DMARC failures for Gmail users who forward mail between accounts. Our guide on best practices for forwarding emails to Gmail users covers how to maintain authentication through forwarding chains.

Learning SPF, DKIM, and DMARC Together in Google Workspace

If you want a single walkthrough that covers all three protocols in the Google Workspace context, see our guide on learning to set up SPF, DKIM, and DMARC in Google Workspace. It covers the complete authentication stack from start to finish.

Security Requirements and Compliance

Google Workspace has specific security requirements that intersect with DMARC. Our guide on security requirements for Gmail covers the authentication baseline expected by Google, including how DMARC fits into the broader security picture.

For organizations in healthcare using Google Workspace, see our guide on whether Gmail is HIPAA compliant, which covers authentication requirements in the context of healthcare data regulations.

Next Steps

Once your Google Workspace DMARC setup is complete and you are at p=reject, consider:

  1. Implementing BIMI to display your brand logo in Gmail. See our BIMI and Google guide.
  2. Setting up ongoing monitoring with DMARC Report to catch authentication regressions.
  3. Reviewing subdomain policies to ensure subdomains are also protected.
  4. Training your team on email authentication basics so new services are properly authenticated before launch.

For the complete DMARC setup process across all platforms, see our DMARC setup complete guide.

Brad Slavin
Brad Slavin

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

LinkedIn Profile →

Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.