Check your email security setup in 30 seconds

Investigate is a free tool that instantly verifies if your email security is set up to block email impersonation and what to do if it isn’t!

How does DMARC block email impersonation?

DMARC stands for Domain-based, Messaging, Authentication, Reporting and Conformance. It was ratified so that domain owners could take back control of their email identity, by telling receiving inboxes to reject fake emails impersonating their organization (also known as spoofs). By authenticating an email’s origin with DMARC, email deliverability also improves.

How will Investigate help me with DMARC?

Investigate gives you an easy-to-digest overview of your DMARC setup in seconds, including actionable next steps if something is not configured as it should be.

Two key email security protocols DMARC looks for:

The status of SPF, DKIM, and DMARC is hidden in the email header when you send an email from any of your services. In a matter of seconds and free of charge, Investigate allows you to decrypt these details into meaningful insight and instantly better understand your email setup.

Check email DMARC setup

Here’s how Investigate works in 2 simple steps

Step 1 – Send an email to Investigate’s inbox
Investigate has a unique inbox that will instantly assess your email security. Simply send an email to its address from the sending service you wish to check.

Step 2 – Get the results!
Once your email is sent, your results for DMARC will be revealed with full insight into other areas including SPF, DKIM, TLS and FCrDNS.

The results are clearly presented in a card format, one for each security protocol as shown below:

Each card contains detailed information about the protocol and why it passed or failed. All of the highlighted keywords link to the glossary on our OnDMARC Knowledge Base should you need further information. If you’re struggling to understand your email security setup or looking to take your first steps to improve email deliverability, try investigate today!

PUBLISHED BY

Red Sift

12 Feb. 2020

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more