Most businesses think they know what sends email in their name. They probably don’t. The gap between what an organisation thinks is sending email and what actually is tends to be larger than expected, and DMARC reporting is often the first thing to make it visible. It doesn’t just help block fraudulent email; it shows you the full picture of what is happening under your domain, right now.
That visibility matters more than most organisations realise. For South African businesses operating under POPIA, it is quickly becoming a practical compliance consideration, not just a technical nicety.
DMARC is a reporting tool, not just a blocking tool
DMARC (Domain-based Message Authentication, Reporting and Conformance) tells receiving mail servers what to do when email claiming to be from your domain fails authentication checks. But the standard includes a second, equally important function: every time a server processes a message, it sends a report back to the domain owner.
Those reports reveal which systems are sending under your domain, whether they are passing SPF and DKIM checks, and whether anything unexpected is showing up in the data. Google’s own admin guidance is explicit: DMARC reports help you monitor email sent from your domain, including email that merely appears to come from it. That includes uncovering setup problems and possible malicious activity.
The reports are the feature. Blocking is what you do once the reports have given you clarity.
The problem is that raw DMARC reports are dense XML files, high in volume and not designed for ordinary business users. Many organisations have reporting enabled in principle but lack any structured way to read, interpret, or act on what the reports contain. The result is visibility in theory and a blind spot in practice.
Why most businesses don’t know their own email footprint
Email infrastructure has a habit of growing faster than anyone tracks it. A marketing platform joins for a campaign and quietly never leaves. A new CRM takes over client communications. A finance system starts sending automated invoices. A support desk tool issues ticket confirmations. By the time anyone looks closely, an organisation’s domain may be sending email from half a dozen different systems: some properly authenticated, some not, and some the IT team has no record of at all.
Google’s guidance is clear: you must configure any third-party service sending email on your behalf correctly to pass authentication checks. DMARC reporting is often the first place organisations discover a gap. That might mean a legitimate sender nobody ever fully set up, or an old integration still running long after someone should have switched it off.
Many businesses assume things are under control because email flows without obvious problems. DMARC reporting frequently reveals a different reality.
Same-domain spoofing: why it is more convincing than you think
When people think about email fraud, they picture look-alike domains: a misspelt variation of your name, or a domain designed to pass a quick glance. Same-domain spoofing is different, and more dangerous. The attacker is not faking a similar domain; they are sending email that appears to come directly from your real domain.
That means the message carries the full weight of your business identity. There is no misspelling to catch, no suspicious domain to flag. Recipients are far more likely to trust a fraudulent payment instruction, a credential request, or a social engineering attempt if it arrives from what looks like your real address.
DMARC reporting shows you if this is happening. A properly enforced DMARC policy is one of the few technical controls that can actually stop it.
Why this matters under POPIA
POPIA requires responsible parties to protect the integrity and confidentiality of personal information through appropriate, reasonable technical and organisational measures (Section 19). Organisations share, request, and action personal information through email every day. When someone uses your domain to deceive recipients, that risk falls directly within POPIA scope.
POPIA does not name DMARC. But when attackers use your domain to impersonate your organisation, expose client data, issue fraudulent instructions, or undermine the integrity of communications, this likely engages your information security obligations under POPIA. The risk is not hypothetical. Business email compromise is one of the most common and costly forms of cybercrime affecting South African organisations.
If your business handles payments, personal information, client instructions, or sensitive correspondence, treat DMARC reporting as a practical control, not an optional extra.
DMARC reporting matters even if you are not a bulk sender
There is a widespread misconception that DMARC is primarily a concern for large or bulk email senders. Google, Yahoo, and Microsoft have all tightened requirements for high-volume senders, which has drawn attention to the standard. But that narrative has an unintended side effect. Smaller organisations sometimes conclude that DMARC isn’t relevant to them.
That conclusion is wrong. A business sending a few hundred emails a day can still have multiple systems operating under its domain. It can still be exposed to same-domain spoofing. It can still have a legitimate sender failing authentication and ending up in spam. The benefit of DMARC reporting is clarity about your own email environment, and that applies regardless of send volume.
A sensible place to start
The practical value of DMARC reporting is that it replaces assumption with evidence. Before you can enforce a strict policy (rejecting or quarantining email that fails authentication) you need to know what is legitimately sending under your domain. Enforcing too early, without that picture, means legitimate email gets blocked.
Google’s guidance supports exactly this approach: use reports first to understand what is happening, then move toward stricter enforcement once the picture is clear. Getting that sequence right is what turns DMARC from a switch you are nervous to flip into a control you can manage with confidence.
For organisations that want a structured way to work through this process, ARMD.digital’s DMARC Protection covers reporting, review, and enforcement in a way that works for South African businesses operating under real compliance pressure.
DMARC reporting turns your domain from a blind spot into something you can actually see and manage. That is often the missing step between assuming your email is secure and knowing it is.
In an environment shaped by POPIA and a growing threat landscape, that visibility is not a technical detail. It is a business control.



