DMARC Quarantine vs. DMARC Reject: Which Should You Implement?

Implementing a p=quarantine DMARC Policy

  • Quarantine: If the email receiver has a quarantine mailbox, this is where the message will be delivered. It will then be up to the administrator of the mailbox to decide if the email gets delivered or thrown away.
  • Deliver to spam: If the email receiver hosts the recipient’s mailbox, then the receiver may have the option to deliver non-compliant email into the recipient’s spam folder. The receiver would then have the option to determine if he or she would like to move it to the inbox.
  • Aggressive anti-spam filtering: Most receivers will see quarantined messages as something that is spam-like and could add additional scoring to the message itself. This additional step would allow the receiver to block the message due to its high spam scoring.

Implementing a p=reject DMARC Policy

So Which Should You Choose?

--

--

--

Agari is the Trusted Email Identity Company™, protecting companies and people from phishing and socially-engineered email attacks.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Secure Edge: Daily Round-up of Infosec Blogs — Issue #43

Cyber Defense: Tim Redfearn of ADS On The 5 Things Every American Business Leader Should Do To…

Repelling A Ransomware Attack: Joel Fulton of Lucidum On The 5 Things You Need To Do To Protect…

Cyber Defense: Jarred Capellman of SparkCognition On The 5 Things Every American Business Leader…

The Cyber security Review magazine

Wisdom From The Women Leading The Cybersecurity Industry, With Rois Ni Thuama of Red Sift

Repelling A Ransomware Attack: Trend Micro’s Jon Clay On The 5 Things You Need To Do To Protect…

Fileless Malwares

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Agari

Agari

Agari is the Trusted Email Identity Company™, protecting companies and people from phishing and socially-engineered email attacks.

More from Medium

why sms (TXT) is not a reliable 2nd authentication factor

Suspicious Mshta.exe Behavior — letsdefend.io Walkthrough

Using xdotool and shell scripts to automate keystrokes and randomise GatherTown avatar movements

Finding Medical PII Exposed on AWS S3 Buckets