Skip to main content
Tranco Top Sites 5.5M domains

Email Authentication 2026: DMARC Adoption Rate & SPF Statistics

DMARC adoption at 30.4% across 5.5 million domains. Original research study analyzing SPF, DKIM, MTA-STS, BIMI, and DANE adoption across the full Tranco list.

Executive Summary

As of February 2026, 30.4% of 5.5 million domains have adopted DMARC, but only 12.8% of all scanned domains enforce policies that protect against spoofing. Despite Google and Yahoo's authentication mandates implemented in 2024, 69.6% of domains remain vulnerable to email fraud.

This study analyzes email authentication adoption across 5,499,028 domains from the complete Tranco Top Sites List, covering six core protocols: DMARC, SPF, DKIM, MTA-STS, BIMI, and DANE/TLSA. Data was collected February 27, 2026, using DMARCguard's scanner.

Key Findings

30.4% DMARC Adoption
12.8% DMARC Enforcement
56.0% SPF Adoption
22.7% DKIM Adoption
2.7% SPF Over-Limit
0.0% DANE Adoption

According to the FBI IC3 2024 Annual Report, Business Email Compromise (BEC) losses reached $2.77 billion across 21,442 complaints. Email authentication protocols like DMARC reduce this attack surface by verifying sender identity before messages reach inboxes.

For actionable guidance on implementing these protocols, read our guide on how to fix DMARC failures.

Top 10K vs. Full Internet: The Adoption Gap

The top 10,000 highest-traffic domains show dramatically higher adoption than the broader internet. This gap reveals a two-tier email security landscape: well-resourced organizations at the top adopt authentication protocols at 2-3x the rate of the general domain population.

ProtocolTop 10KFull 5.5MGap
DMARC62.5%30.4%-32.1pp
SPF67.4%56.0%-11.4pp
DKIM38.9%22.7%-16.2pp
MTA-STS1.8%0.3%-1.5pp
BIMI7.5%0.4%-7.1pp
DANE0.0%0.0%

Top 10K data from our initial scan of Tranco's highest-ranked domains. Full dataset covers 5,499,028 domains from the complete Tranco list. Both scans performed February 2026.

Methodology

Data Source

Tranco Top Sites List (Full list, February 2026). 5,499,028 domains scanned from the complete Tranco ranking. DNS queries via system resolver. Scan duration: approximately 15 hours with 50 concurrent workers and crash-recovery checkpointing.

Scanner Tool
  • DMARCguard's proprietary scanner performed live DNS and HTTPS-based protocol detection across six protocols:
  • DMARC (RFC 7489) — TXT lookup at _dmarc.<domain>
  • SPF (RFC 7208) — TXT lookup with full include/redirect flattening and 10-lookup limit tracking
  • DKIM (RFC 6376) — TXT probe of six common selectors (default, google, selector1, selector2, k1, dkim) at <selector>._domainkey.<domain>
  • MTA-STS (RFC 8461) — TXT lookup at _mta-sts.<domain> plus HTTPS policy fetch
  • BIMI — TXT lookup at default._bimi.<domain> with SVG Tiny PS validation
  • DANE/TLSA (RFC 7672) — TLSA record lookup at _25._tcp.<mx> with STARTTLS probe
  • Scans ran with 50 concurrent workers, 15-second per-domain timeout, and crash-recovery checkpointing.
Scan Date

Limitations
  • DKIM adoption underreported — scanner probes six common selectors only (default, google, selector1, selector2, k1, dkim); domains using custom or rotated selectors are missed
  • Subdomain policies not analyzed — only organizational-domain DMARC records are checked
  • DANE/TLSA detection uses DNS heuristics — Go standard library does not natively support TLSA record types; DNSSEC validation is not performed by the scanner
  • BIMI SVG validation checks SVG Tiny PS profile structure but does not verify VMC/CMC certificate chain trust anchors
  • Tranco ranking biased toward web traffic — low-traffic or newly registered domains may differ from this sample
  • No forensic report (RUF) analysis due to privacy concerns and low adoption
Cite This Research
DMARCguard. (2026). State of Email Authentication 2026: Adoption Statistics for DMARC, SPF, DKIM, and Advanced Protocols. https://dmarcguard.io/research/email-authentication-2026/

DMARC Adoption Rate and Enforcement

As defined in RFC 7489, DMARC (Domain-based Message Authentication, Reporting & Conformance) builds on SPF and DKIM to verify sender identity and provide policy enforcement. Our scan found 30.4% DMARC adoption (1,670,975 domains), but a critical enforcement gap persists.

DMARC Policy Distribution

None 967,474 (57.9%)
Quarantine 374,041 (22.4%)
Reject 327,959 (19.6%)

The enforcement rate — the share of all scanned domains using p=quarantine or p=reject — stands at 12.8% (702,000 of 5,499,028 domains). Among DMARC-enabled domains specifically, 42.0% enforce policies, while 57.9% (967,474 domains) remain at p=none (monitoring-only mode).

Industry analysis from EasyDMARC (2025) shows Fortune 500 DMARC adoption at 93.8%, with 62.7% at enforcement (p=quarantine or p=reject), driven by Google and Yahoo's February 2024 bulk sender requirements. Our full Tranco 5.5M sample (30.4%) captures the entire domain landscape beyond enterprises, providing the most representative cross-industry baseline.

Aggregate reporting (RUA) is configured on 53.5% of DMARC-enabled domains — 894,057 of 1,670,975 publish a rua= tag to receive daily authentication reports from major receivers. The remaining 776,918 DMARC-enabled domains lack visibility into their authentication failures.

Despite two years of enforcement pressure from major email providers, 69.6% of domains still lack DMARC entirely. Of those with DMARC, over half (57.9%) remain at monitoring-only policy (p=none), suggesting hesitation to move to enforcement due to legitimate sender configuration challenges.

Among the top 10,000 highest-traffic domains, DMARC adoption reaches 62.5% — more than double the full-internet rate of 30.4%, demonstrating the gap between well-resourced organizations and the broader web.

For step-by-step guidance on moving from p=none to p=reject, see our DMARC policy migration guide.

SPF Adoption Rate and the 10-Lookup Limit Challenge

SPF (Sender Policy Framework, RFC 7208) shows the highest adoption rate at 56.0% (3,077,219 domains), exceeding both DMARC (30.4%) and DKIM (22.7%). SPF's relative simplicity — a single TXT record at the root domain — explains its widespread deployment. For a deep dive into which providers domains depend on via SPF includes, see our SPF Supply Chain study.

However, 4.8% of SPF-enabled domains (148,655 of 3,077,219) exceed RFC 7208's hard limit of 10 DNS lookups, triggering PermError failures. When SPF returns PermError, email authentication fails entirely, potentially causing DMARC failures if DKIM alignment is not present.

Common Cause: Multiple Third-Party Services

Organizations using Google Workspace (2 lookups) + Mailchimp (3 lookups) + HubSpot (3 lookups) + Zendesk (2 lookups) + Salesforce (3 lookups) total 13 DNS lookups — exceeding the limit by 30%.

Email Service ProviderSPF MechanismDNS Lookups
Google Workspaceinclude:_spf.google.com2
Mailchimpinclude:servers.mcsv.net3
HubSpotinclude:_spf.hubspotemail.net3
SendGridinclude:sendgrid.net2
Amazon SESinclude:amazonses.com1
Zendeskinclude:mail.zendesk.com2
Salesforceinclude:exacttarget.com3

Additionally, 28.8% of domains have SPF or DKIM but no DMARC (1,584,176 domains). SPF alone provides limited anti-spoofing protection because it only validates the envelope sender (Return-Path), not the From header visible to end users.

For solutions to SPF lookup limit violations, including subdomain splitting and IP address consolidation, read our guide on SPF 10-lookup limit fixes.

DKIM Adoption Rate

DKIM (DomainKeys Identified Mail, RFC 6376) shows the lowest adoption rate at 22.7% (1,249,750 domains) among the three core authentication protocols. DKIM adoption lags SPF (56.0%) by 33.3 percentage points and DMARC (30.4%) by 7.7 percentage points.

SPF
56.0%
DMARC
30.4%
DKIM
22.7%

Why DKIM lags: DKIM requires cryptographic key pair generation, DNS publishing of the public key at `selector._domainkey.domain`, and mail server configuration to sign outbound messages with the private key. This multi-step process is significantly more complex than SPF's single TXT record.

Methodology Note: DKIM Detection Limitations

DKIM adoption is likely underreported in this study. Our scanner checked common DKIM selectors (default, google, selector1, selector2, k1, dkim) via DNS lookups, but cannot discover custom or rotated selectors without sending an email. Actual DKIM adoption may be 5-10 percentage points higher.

Common selectors detected include google._domainkey (Google Workspace), selector1._domainkey (Microsoft 365), and k1._domainkey (Mailchimp). No domains in our sample deployed DKIM-only configurations (DKIM without SPF or DMARC) — DKIM is always paired with at least SPF.

Many domains rely solely on SPF alignment for DMARC pass, which is acceptable per RFC 7489 but provides less redundancy. If SPF fails due to email forwarding or IP changes, DKIM serves as the fallback authentication mechanism.

MTA-STS Adoption: Transport Layer Security for SMTP

MTA-STS (Mail Transfer Agent Strict Transport Security, RFC 8461) shows only 0.3% adoption (15,997 domains) — 101x lower than DMARC (30.4%). MTA-STS enforces TLS encryption on SMTP connections, preventing downgrade attacks where adversaries strip STARTTLS to intercept email in transit.

Mode distribution:

  • enforce: 0.17% (9,364 domains) — active protection against downgrade attacks
  • testing: 0.12% (6,383 domains) — monitoring mode, logs policy violations without blocking

Why MTA-STS adoption is low: MTA-STS requires three components:

  1. HTTPS hosting for the policy file at https://mta-sts.yourdomain.com/.well-known/mta-sts.txt
  2. DNS TXT record at _mta-sts.yourdomain.com with policy ID
  3. Valid TLS certificate for mta-sts.yourdomain.com

This infrastructure requirement is significantly more complex than DMARC, SPF, or DKIM (which only require DNS TXT records). Additionally, MTA-STS is backend-only security with no user-visible benefits, unlike BIMI (inbox logos), reducing organizational priority.

Major email providers led adoption: Google deployed MTA-STS in April 2019, with Yahoo following subsequently. The Electronic Frontier Foundation's STARTTLS Everywhere initiative (2018–2020) helped push the ecosystem toward transport security before being wound down after STARTTLS encryption reached approximately 90% and MTA-STS matured as a standard.

DMARCguard Differentiator

DMARCguard is one of the few email authentication platforms that monitors MTA-STS compliance. Most DMARC-only tools ignore transport security entirely.

For implementation guidance, see our MTA-STS setup guide.

BIMI Adoption: Brand Indicators for Message Identification

BIMI (Brand Indicators for Message Identification) shows 0.4% adoption (20,518 domains) — 1.3x higher than MTA-STS (0.3%) despite being less critical for security. BIMI displays the sender's logo in recipient inboxes (Gmail, Yahoo, Apple Mail support), providing visible brand differentiation.

Of the 20,518 domains with BIMI records, 71.8% have valid SVG logos (14,739 domains) successfully validated via HTTP fetch. The remaining 5,779 domains (28.2% of BIMI-enabled) have broken BIMI records — either 404 errors on the SVG URL or invalid image formats.

BIMI prerequisites per the BIMI Group specification:

  • DMARC enforcement: p=quarantine or p=reject (p=none insufficient)
  • SVG logo: Tiny Portable/Secure (Tiny PS) profile, hosted at publicly accessible HTTPS URL
  • VMC (Verified Mark Certificate): Required by Gmail for logo display; optional for Yahoo/Apple Mail

BIMI requires DMARC at p=quarantine or p=reject as a prerequisite. Domains that have published BIMI records without meeting the enforcement prerequisite will not have their logos displayed by compliant receivers.

Why BIMI adoption exceeds MTA-STS: BIMI provides user-visible brand differentiation in crowded inboxes, driving marketing and brand team investment. Fortune 500 companies (Apple, Microsoft, PayPal) widely deploy BIMI. Financial services (banks, fintech) adopt BIMI as an anti-phishing trust signal.

In contrast, MTA-STS is backend-only transport security with no inbox visibility, making it harder to justify to non-technical stakeholders despite superior security benefits.

For implementation guidance, see our BIMI setup guide.

DANE/TLSA Adoption: Zero Adoption for Email Security

DANE (DNS-based Authentication of Named Entities, RFC 7672) shows near-zero adoption — only 30 domains in our 5.5 million-domain sample publish TLSA records for email (SMTP). Meanwhile, 46.9% of domains (2,581,479) support STARTTLS encryption on port 25.

What is DANE: DANE uses DNSSEC-signed TLSA records to cryptographically verify TLS certificates, eliminating reliance on Certificate Authorities. DANE represents the "ideal" email security standard — no CA trust required, direct cryptographic verification of MX host certificates.

Why zero adoption:

  1. DNSSEC prerequisite: DANE requires DNSSEC, which remains a significant deployment barrier. According to APNIC Labs, approximately 35% of DNS resolvers validate DNSSEC globally (largely driven by Google and Cloudflare public resolvers), but zone signing remains around 7%. Our scan found only 30 TLSA records for email across 5.5 million domains.
  2. Complex setup: Requires TLSA record per MX host at _25._tcp.mx.domain, certificate hash rotation on renewal, DNSSEC key management.
  3. Limited receiver support: Postfix, Exim, and Microsoft 365 (outbound since Q1 2022, inbound GA October 2024) verify DANE TLSA records for SMTP. Gmail and Yahoo do not support DANE for email.

The DNSSEC deployment gap explains DANE's absence: while resolver-side validation has reached approximately 35% globally (APNIC Labs, 2026), the authoritative-side zone signing required for DANE remains in single digits. Without DNSSEC-signed zones, DANE TLSA records cannot be validated — creating a chicken-and-egg problem for email deployment.

For comparison, DANE for HTTPS (RFC 6698) also shows negligible adoption — major browsers (Chrome, Firefox) never implemented DANE verification, making it effectively unused for web traffic. Email DANE (RFC 7672) faces the same DNSSEC barrier plus limited receiver support.

MTA-STS Emerged as the De Facto Standard

MTA-STS (RFC 8461) solves the same transport security problem as DANE but without requiring DNSSEC. Despite low adoption (0.3%), MTA-STS is the only transport security standard with measurable deployment and is supported by all major email providers.

DANE represents a theoretical security improvement but a practical failure for email. The complexity barrier (DNSSEC + TLSA record management + minimal receiver support) prevents real-world deployment.

DMARCguard Differentiator

DMARCguard is the only DMARC platform that scans for DANE/TLSA records. Our data shows why: near-zero adoption (30 domains out of 5.5 million). We monitor DANE to track potential future adoption as EU NIS2 regulations evolve.

Email Authentication Trends: Cross-Protocol Analysis

Analyzing protocol combinations reveals how domains layer authentication mechanisms for defense in depth.

DMARC Requires SPF or DKIM

Per RFC 7489, DMARC passes when at least one of SPF or DKIM produces an aligned identifier. Of the 1,670,975 domains with DMARC:

  • Both SPF and DKIM: 48.5% (810,525 domains) — strongest setup with redundant authentication
  • SPF only (no DKIM detected): 43.0% (718,876 domains) — relies solely on SPF alignment for DMARC pass
  • DKIM only (no SPF): 1.5% (25,109 domains) — valid per RFC 7489 but uncommon
  • Neither detected: 6.9% (114,525 domains) — DMARC record exists but no SPF or common DKIM selectors found

Over 43% of DMARC-enabled domains rely on SPF-only authentication, accepting the risk that email forwarding or IP changes will break authentication. DKIM provides redundancy but requires more complex configuration.

BIMI Enforcement Prerequisite

BIMI requires DMARC at p=quarantine or p=reject as a prerequisite. Receivers (Gmail, Yahoo) enforce this requirement strictly — BIMI logos will not display for domains that lack DMARC enforcement.

Full Stack Adoption

Only 0.04% of domains (1,940 domains) deploy the complete email authentication stack: DMARC + SPF + DKIM + MTA-STS + BIMI (excluding DANE due to near-zero adoption).

40.8% of domains (2,243,877 domains) have NO email authentication whatsoever — no DMARC, SPF, DKIM, MTA-STS, or BIMI. These domains are fully vulnerable to spoofing, phishing, and BEC attacks.

ConfigurationCountPercentageSecurity Posture
Full stack (DMARC+SPF+DKIM+MTA-STS+BIMI)1,9400.04%Strongest
DMARC+SPF+DKIM810,52514.7%Strong
DMARC+SPF only718,87613.1%Moderate
Other DMARC configurations139,6342.5%Moderate
SPF or DKIM only (no DMARC)1,584,17628.8%Weak
No authentication2,243,87740.8%Vulnerable

The data reveals a stark reality: the largest single group (40.8%) has no email authentication at all. Among authenticated domains, SPF or DKIM without DMARC (28.8%) is the most common configuration. DMARC + SPF + DKIM (14.7%) and DMARC + SPF only (13.1%) follow. Advanced protocols (MTA-STS, BIMI) remain niche — full-stack deployment (0.04%) is exceptionally rare.

Domain Distribution by TLD

Our scan covers 1,321 unique TLDs. The following breakdown uses actual per-domain scan results — no estimates or approximations.

TLDDomainsDMARCSPFDKIM
.com3,008,323 (54.7%)30.0%58.7%24.7%
.net275,199 (5.0%)25.0%55.4%20.9%
.ru211,251 (3.8%)18.9%47.8%8.9%
.org144,489 (2.6%)40.6%59.4%30.1%
.de136,207 (2.5%)38.6%76.8%16.2%
.uk79,218 (1.4%)47.1%62.8%31.5%
.io27,220 (0.5%)44.9%58.0%28.3%

Government and Education Domains

Government and education TLDs show markedly different adoption patterns from the general domain population:

  • .gov domains (3,746 domains): 76.4% DMARC adoption with 1,225 at p=reject — driven by CISA BOD 18-01 mandate requirements
  • .edu domains (4,332 domains): 84.0% DMARC adoption with 761 at p=reject — higher adoption than the general population, though enforcement lags due to alumni email forwarding challenges

Both .gov (76.4%) and .edu (84.0%) significantly outperform the overall DMARC adoption rate of 30.4%, demonstrating the impact of regulatory mandates and institutional IT governance on email security deployment.

Frequently Asked Questions

How many domains have DMARC?

30.4% of 5.5 million domains have a DMARC record as of February 2026 — 1,670,975 domains total. Of these, 42.0% enforce with quarantine or reject policies. See our full DMARC adoption analysis.

What percentage of domains with DMARC enforce protection?

12.8% of 5.5 million domains (702,000 domains) enforce DMARC policies (6.0% p=reject, 6.8% p=quarantine). Among DMARC-enabled domains, the enforcement rate is 42.0%. See DMARC enforcement details.

How many domains exceed the SPF 10-lookup limit?

4.8% of SPF-enabled domains (148,655 of 3,077,219) exceed the RFC 7208 10-DNS-lookup limit, causing PermError failures. See our SPF analysis for common causes.

What is DMARC enforcement rate?

The DMARC enforcement rate is 12.8% of all scanned domains (42.0% of DMARC-enabled domains) using p=quarantine or p=reject. See full breakdown.

Why is MTA-STS adoption so low?

MTA-STS adoption is only 0.3% (15,997 of 5.5 million domains) because it requires HTTPS hosting, a DNS TXT record, and a valid TLS certificate — significantly more complex than DNS-only protocols. See our MTA-STS analysis.

What is BIMI adoption rate in 2026?

BIMI adoption is 0.4% (20,518 domains), with 14,739 having valid SVG logos (71.8% of BIMI-enabled). BIMI requires DMARC enforcement as a prerequisite. See our BIMI analysis.

Why is DANE adoption near zero for email?

Only 30 domains in our 5.5 million-domain study deploy DANE/TLSA records for email, due to the DNSSEC prerequisite and limited receiver support. See our DANE analysis.

How often do DMARC reports get sent?

DMARC aggregate reports (RUA) are sent daily by receiving mail servers like Gmail, Outlook, and Yahoo. Each report covers a 24-hour period. Forensic reports (RUF) are sent per-message but have very low adoption. In our scan, 53.5% of DMARC-enabled domains (894,057 of 1,670,975) have a rua= tag configured. See DMARC reporting details.

How many companies use DMARC?

30.4% of 5.5 million domains have DMARC as of February 2026. Among Fortune 500 companies, adoption reaches 93.8% (EasyDMARC, 2025). However, only 12.8% of all domains enforce protection with p=quarantine or p=reject. See our full adoption breakdown.

How many DMARC records can a domain have?

Exactly one. Per RFC 7489, a domain must publish a single DMARC TXT record at _dmarc.yourdomain.com. Multiple records cause ambiguity — receivers apply no policy, effectively disabling DMARC. Each subdomain can have its own separate record, but only one per domain is allowed.

Conclusion

Email authentication adoption is accelerating, driven by Google and Yahoo's 2024 bulk sender mandates, but significant gaps remain in enforcement and advanced protocol deployment.

Key takeaways:

  • DMARC adoption (30.4%) is growing, but 69.6% of domains remain unprotected
  • Enforcement is critical — only 12.8% of domains actively block spoofed emails with p=quarantine or p=reject
  • SPF is most widely adopted (56.0%), but 4.8% of SPF-enabled domains risk PermError from 10-lookup limit violations
  • DKIM lags (22.7%) due to configuration complexity (key pairs, DNS publishing, mail server integration)
  • Advanced protocols remain niche — MTA-STS 0.3%, BIMI 0.4%, DANE 0.0%
  • Full-stack adoption (DMARC+SPF+DKIM+MTA-STS+BIMI) is only 0.04% of domains

This is the baseline study for 2026. Quarterly re-scans will track adoption trends, protocol migration (p=none → p=reject), and sector-specific changes. Watch for Q2 2026 updates.

References & Sources

  1. Tranco Top Sites List — Domain ranking methodology. tranco-list.eu
  2. FBI Internet Crime Complaint Center (IC3) — 2024 IC3 Annual Report: BEC losses of $2.77 billion across 21,442 complaints. ic3.gov
  3. CISA BOD 18-01 — Binding Operational Directive 18-01: Enhance Email and Web Security (October 16, 2017; deadline October 16, 2018). cisa.gov
  4. EasyDMARC — DMARC Adoption Across Fortune 500 and Inc. 5000 (2025): 93.8% F500 adoption, 62.7% enforcement. easydmarc.com
  5. APNIC Labs — DNSSEC deployment statistics: approximately 35% resolver validation globally, ~7% zone signing. stats.labs.apnic.net
  6. Microsoft — Inbound SMTP DANE with DNSSEC for Exchange Online, GA October 2024. techcommunity.microsoft.com
  7. Google Workspace Updates — MTA-STS support for Gmail (April 2019). workspaceupdates.googleblog.com
  8. EFF — Winding Down the STARTTLS Everywhere Project and the Future of Secure Email (April 2020). eff.org

Cite This Research

Plain text citation:

DMARCguard. (2026). State of Email Authentication 2026: Adoption Statistics for DMARC, SPF, DKIM, and Advanced Protocols. Retrieved from https://dmarcguard.io/research/email-authentication-2026/

BibTeX format:

@misc{dmarcguard2026,
  title={State of Email Authentication 2026: Adoption Statistics for DMARC, SPF, DKIM, and Advanced Protocols},
  author={DMARCguard Research Team},
  year={2026},
  month={February},
  howpublished={\url{https://dmarcguard.io/research/email-authentication-2026/}},
  note={Data collected February 27, 2026. Sample: 5,499,028 domains from Tranco Top Sites List (full list).}
}

Full methodology details, data sources, and limitations are documented in the Methodology section above. The scanner is a proprietary tool built by DMARCguard that performs live DNS and HTTPS-based protocol detection across DMARC, SPF, DKIM, MTA-STS, BIMI, and DANE/TLSA.

Download the Dataset

Freely available for research and citation — no signup required.

Full Dataset

Complete scan results for all 5,499,028 domains — every protocol, every record.

CSV (gzip) · 242 MB

Top 10K Sample

Highest-ranked domains only — ideal for quick analysis.

CSV · 3 MB

Aggregate Stats

Summary metrics across all 5.5M domains — protocol totals, rates, breakdowns.

JSON · 2 KB

PDF Report

Formatted report with charts and key findings.

Coming soon

Monitor your own domains

Continuous monitoring, aggregate report parsing, and actionable insights for all your email authentication protocols.

Start Free