https://godmarc.io
Actively Block Phishing
Boost Email Deliverability
Get Visibility
DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols, adding
linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.
At a high level, DMARC is designed to satisfy the following requirements:
Minimize false positives.
Provide robust authentication reporting.
Assert sender policy at receivers.
Reduce successful phishing delivery.
Work at Internet scale.
Minimize complexity.
It is important to note that DMARC builds upon both the DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) specifications that are currently being developed within the IETF. DMARC is designed to replace
ADSP by adding support for:
Wildcarding or subdomain policies,
Non-existent subdomains,
Slow rollout (e.g. percent experiments)
SPF
Quarantining mail
Presentation on how to chat with PDF using ChatGPT code interpreter
GoDMARC - Block Email Phishing
1.
2. 2
Is my Domain being Spoofed ?
Visible Email Logs
Email Phishing Attacks
We take you to “REJECT”
3. • Business email compromise (BEC)
scams cost organizations $676
million in 2017 - FBI's Internet
Crime Report
• 76% of organizations say they
experienced phishing attacks in
2017 – By Wombat 2018 State of
the Phish
• Fake invoice messages are the #1
type of phishing lure
• Source: Symantec 2017 Internet Security
Threat Report (ISTR)
• More than 400 businesses are
targeted by BEC scams every day.
• Source: Symantec 2017 Internet Security
Threat Report (ISTR)
3
Email Frauds Stats
4. By default, Email is not secure.
That's not an inflammatory statement, just the inconvenient truth.
What is DMARC?
ØDomain-based Message
Authentication, Reporting and
Conformance is a protocol that was
first proposed in January 2012.
ØThe DMARC protocol is actually only
the top layer of a set of protocols
and technologies that when used
together help improve email
security.
ØDMARC can be thought of as the
policy layer for email authentication
technologies known as Sender Policy
Framework (SPF) and Domain Keys
Identified Mail (DKIM).
4
5. Benefits of DMARC
Brand Protection
RBI Guidelines
Ensure No One can send
Email Except YOU
Deliverability
IP Reputation
SPF/DKIM
Visibility
Cyber Security Risk
Who is sending
What is sent
Security
Stop Email Phishing
Protect YOUR Domain
5
6. Inbound Benefits of DMARC
Implementing DMARC can also prevent some
inbound email threats like BEC.
Business Email Compromise (BEC) is an
inbound threat where attackers impersonate
company officials and send deceptive emails
requesting wire transfers to alternate,
fraudulent accounts. Often results in successful
intrusion and access to victims’ credentials.
2
7. Inbound Benefits of DMARC
• When configured correctly, DMARC stops
phishing attacks where the attacker sends an
email with a ‘From’ address that appears to
originate from a protected domain. This makes
it ideal for outbound phishing prevention, but
is not an acceptable solution for inbound
traffic.
• While DMARC partially addresses BEC and
sophisticated inbound threats, you need to
augment your gateway protections with a
comprehensive layer that identifies all forms
for sender identity deception.
While DMARC partially addresses BEC and
sophisticated inbound threats, you need to
augment your gateway protections with a
comprehensive layer that identifies all forms for
sender identity deception. 2
Inbound Deception Technique Addressed by DMARC
Direct / Same Domain
Spoofing
YES
Display Name Spoofing NO
Look-alike Domain Spoofing NO
Inbound Threats Stopped by DMARC Policies
11. 1 Publish a DMARC record
To begin collecting feedback from receivers, publish a DMARC record
doing so will cause DMARC-compliant receivers to generate and send
aggregate feedback. The “p=none” tag lets receivers know that the
domain owner is only interested in collecting feedback.
2 Deploy email authentication – SPF and DKIM
Deployment of SPF involves creating and publishing an SPF record that
describes all of the servers authorized to send on behalf of an email
domain.
Deployment of DKIM requires domain owners to configure email servers
to insert DKIM-Signatures into email and to publish public keys in the
DNS. DKIM is widely available and supported by all major email vendors.
3 Ensure that Identifier Alignment is met
DMARC-supplied aggregate feedback can be used to identify where
underlying authentication technologies are generating authenticated
domain identifiers that do not align with the Email Domain. Correction
can be rapidly made once misalignment is identified. By taking these
steps, domain owners can effectively monitor email and make informed
security decisions.
Deployment of DMARC
All Heavy lifting is
done by GoDMARC
11
12. Confidentiality with DMARC
• Yes! Two kinds of reporting built into DMARC
• •Aggregate reports – all email traffic observed using a given
domain during the reporting period, typically 24 hours
• •Failure reports – details for specific messages that failed to
authenticate
5