| TTL | |
| Address | 

                        DMARC should always be used in conjunction with SPF and DKIM authentication records. In this context, in order to create a DMARC record, first of all, SPF and DKIM records must be completed in your domain name. You will then need to access DNS management and create a TXT record containing the DMARC record tags.
Thanks to DMARC records, when e-mails that reach e-mail providers and appear to be yours arrive, you are informed about what to do when a message that does not perform authentication checks on these e-mails or does not create authentication rules in your DMARC record. With this advantage, e-mails without a verified identity will not be able to impersonate you or your company.
With the use of this protocol 
                                    • Organizations cannot phishing customers.
                                    • It is not possible to misuse your brand name and turn it into fraudulent material.
                                    • The possibility of sending malicious software and spam software to individuals through your brand and organization is prevented.
                                    • In particular, identity attacks can be prevented.
                                    
                                   Reports generated by DMARC should be sent to the e-mail address you specified during DMARC registration on a regular basis. In these reports;  
                                    • Who sent messages to your e-mail account,
                                    • What percentage of incoming messages passed successfully under DMARC control,
                                    • From which servers the e-mails that produced unsuccessful results in DMARC control came from,
                                    • Information about which DMARC operation performed by e-mails that could not obtain authentication can be obtained.
                                    After these reports are obtained through e-mail accounts, all necessary precautions can be taken against counterfeiting, spam, or phishing attacks, which may be followed by e-mail account owners or account managers.
                                    
A sample DMARC record can be used in a practical way over Atak Domain in the line frame presented below.
v=DMARC1; p=reject; rua=mailto:[email protected], mailto:[email protected]; pct=100; adkim=s; aspf=s
We are with you whenever you need it!