Based on the image you've provided from the MxToolbox SuperTool, here is a breakdown of the problem and the solution.
The screenshot shows the results of a DNS lookup for worldofwallpaper.com. The critical information is under the "Test" section:
- DMARC Policy Not Enabled: This is the key issue. The result says "DMARC Quarantine/Reject policy not enabled". This means your DMARC record is likely using a policy of
p=none
.
The Problem Explained
A DMARC policy of p=none
tells receiving mail servers to perform the DMARC check but to take no action if it fails. The purpose of this policy is for monitoring and reporting. However, some receiving mail servers, like Microsoft's (Outlook/Hotmail/MSN), have their own stricter policies. When they see a DMARC record with p=none
, they can still choose to reject the email if it fails their internal DMARC alignment checks, which is what's happening to you.
The bounce-back messages you received stated:
DMARC= Fail
550 5.7.515 Access denied, sending domain WORLDOFWALLPAPER.COM doesn't meet the required authentication level.
This confirms that even though your DMARC policy is set to p=none
, Microsoft's servers are still rejecting the emails because the domain isn't meeting their required authentication level. They are looking for a stronger DMARC policy to prove the email's authenticity.
The Solution
You need to change your DMARC policy from p=none
to a more assertive policy to satisfy the requirements of servers like Microsoft's.
Here are the steps to fix this:
Modify your DMARC DNS Record: Access your domain's DNS settings (likely through your domain registrar or hosting provider). Find the TXT record for DMARC. It will look something like this:
_dmarc.worldofwallpaper.com
Change the Policy: Edit the value of the TXT record. Change the p=none
part to either p=quarantine
or p=reject
.
- Recommended first step: Change
p=none
to p=quarantine
.
- p=quarantine: This tells receiving servers to place emails that fail DMARC in the spam folder or quarantine them. This is a safer first step as it gives you a chance to see if any legitimate emails are being affected without them being outright rejected.
- Final goal: Change
p=quarantine
to p=reject
after you are confident that all your legitimate mail is passing DMARC.
- p=reject: This is the strongest DMARC policy and tells receiving servers to outright reject any email that fails DMARC. This is the ultimate goal to prevent malicious actors from spoofing your domain.
Add a DMARC pct
Tag: To be extra cautious, you can also add a pct
(percentage) tag to your record. This allows you to gradually increase the number of emails affected by the policy. For example, p=quarantine; pct=20
would only quarantine 20% of the emails that fail the DMARC check. You can increase this value over time.
New TXT Record Value (example):
v=DMARC1; p=quarantine; rua=mailto:[email protected];
(Replace [email protected]
with a valid email address to receive DMARC reports, which can help you troubleshoot any issues.)
Once you update your DNS record, give it time to propagate (this can take up to 24-48 hours, though often much faster). After propagation, your emails should no longer be rejected by Microsoft servers for this specific DMARC failure.