Blog article

A Domain-based Message Authentication, Reporting, and Conformance (DMARC) bypass happens when attackers send a spoofed email that still passes DMARC checks. On paper, your domain looks protected. In reality, a determined attacker has found a way around your controls.
For security and email teams, this is a high-impact problem. If someone can bypass DMARC, they can deliver convincing phishing emails straight into inboxes.
To bypass DMARC, it isn’t about “breaking” the protocol itself. It is more often the result of overly broad Sender Policy Framework (SPF) records, weak DomainKeys Identified Mail (DKIM) practices, forwarding paths, and application-specific behavior. Understanding these gaps is the first step to closing them.
Before you go deeper, run a quick DMARC check to see if attackers could already be exploiting your domain.
One of the easiest ways to bypass DMARC is to send from infrastructure you already trust. Attackers look for:
If a malicious actor can send from an authorized IP address or from the same server you use, they can align SPF or DKIM and pass DMARC. DMARC only requires one aligned standard (SPF or DKIM) to pass. Many organizations lean on that flexibility and fail to enforce both consistently.
The weakness isn’t in DMARC itself, but in how authorized senders are defined and how alignment is enforced.
Account takeover gives attackers a perfect DMARC bypass. When they send from:
…every message they send looks authentic. SPF passes. DKIM passes. DMARC passes. From a pure authentication perspective, nothing looks wrong. Detecting these attacks relies on behavioral, content, and anomaly-based controls – which means DMARC needs to be part of a broader email security strategy.
Microsoft is often at the center of DMARC bypass investigations. Its evaluation logic, trust model, and legacy tenants can all influence how DMARC is applied.
In some scenarios, an email that should be rejected by DMARC still lands in the inbox. This can happen when Microsoft assigns a Spam Confidence Level (SCL) value of SCL:-1 to a message. This is generally due to misconfigured connectors or allow lists.
In addition, many older Microsoft 365 tenants don’t enforce DMARC by default, so spoofed messages can still be delivered unless admins adjust settings.
From your perspective, it looks like Microsoft has ignored a DMARC policy of p=reject. In reality, trust signals and configuration settings have taken priority, effectively allowing an attacker to bypass DMARC.
Microsoft uses Sender Rewriting Scheme (SRS) to rewrite the “From” address so SPF can pass at the next hop.
Here is how that can play out:
By the time the email reaches the recipient, it can appear to have passed SPF and DMARC, even though it began as a spoofed message.
Preventing DMARC bypass means combining strong email authentication with the right application settings and ongoing user training.
Start by identifying every system that sends email for your domain:
Ensure that each sender is correctly configured. Remove unused services and legacy IP addresses so attackers can’t hide behind old configurations. Where internal expertise is limited, work with specialists who manage large, complex email environments every day.
Once you understand who’s sending, focus on strengthening your protocols:
aspf and adkim).DMARC aggregate and failure reports are your early-warning signs for bypass attempts and misconfigurations. Use them to:
Regular review of this data turns DMARC from a static protocol into an ongoing security control.
Because Microsoft is so widely used, its behavior is often at the center of DMARC bypass cases. A few targeted checks can close common gaps:
SCL:-1 value and/or bypass spam filtering.Managing email authentication manually is time-consuming and easy to get wrong, especially in large or scaling environments. Sendmarc is designed to reduce that risk.
It helps you:
When you’re ready for deeper visibility and improved security, book a demo with Sendmarc. We will help you build an email environment that’s protected against real-world DMARC bypass techniques, not just compliant on paper.