Check your email security setup in 30 seconds

Investigate is a free tool that instantly verifies if your email security is set up to block email impersonation and what to do if it isn’t!

How does DMARC block email impersonation?

DMARC stands for Domain-based, Messaging, Authentication, Reporting and Conformance. It was ratified so that domain owners could take back control of their email identity, by telling receiving inboxes to reject fake emails impersonating their organization (also known as spoofs). By authenticating an email’s origin with DMARC, email deliverability also improves.

How will Investigate help me with DMARC?

Investigate gives you an easy-to-digest overview of your DMARC setup in seconds, including actionable next steps if something is not configured as it should be.

Two key email security protocols DMARC looks for:

The status of SPF, DKIM, and DMARC is hidden in the email header when you send an email from any of your services. In a matter of seconds and free of charge, Investigate allows you to decrypt these details into meaningful insight and instantly better understand your email setup.

Check email DMARC setup

Here’s how Investigate works in 2 simple steps

Step 1 – Send an email to Investigate’s inbox
Investigate has a unique inbox that will instantly assess your email security. Simply send an email to its address from the sending service you wish to check.

Step 2 – Get the results!
Once your email is sent, your results for DMARC will be revealed with full insight into other areas including SPF, DKIM, TLS and FCrDNS.

The results are clearly presented in a card format, one for each security protocol as shown below:

Each card contains detailed information about the protocol and why it passed or failed. All of the highlighted keywords link to the glossary on our OnDMARC Knowledge Base should you need further information. If you’re struggling to understand your email security setup or looking to take your first steps to improve email deliverability, try investigate today!

PUBLISHED BY

Clare Holmes

12 Feb. 2020

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Over 60% of healthcare organizations remain unprotected against data breaches

Sean Costigan

Introduction Red Sift’s analysis of healthcare organizations that reported large breaches to the Department of Health & Human Services (HHS) in 2023-2024 uncovered a troubling trend: post-breach, 61% remain unprotected against phishing and domain spoofing due to weak or nonexistent DMARC policies. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a widely recognized security…

Read more
Awards

Red Sift wins 2025 Cybersecurity Excellence Award for OnDMARC

Jack Lilley

Executive Summary: Red Sift OnDMARC has been recognized with the 2025 Cybersecurity Excellence Award for its advanced email security solutions. By leveraging AI-powered tools like Red Sift Radar for security issues and Dynamic DNS Guardian for real-time monitoring, OnDMARC provides businesses with robust protection against phishing, spoofing, and business email compromise (BEC).  Key takeaways:…

Read more
Product Release

Red Sift’s Winter ‘24/’25 Quarterly Product Release

Francesca Rünger-Field

This quarter, we’re making security faster, smarter, and more proactive with updates that improve threat detection, reduce manual work, and prevent threats before they escalate. Highlights include: Brand Trust  Executive Impersonation: Detect unauthorized use of leadership identities By uploading and managing executive images in Brand Trust, security teams can detect and monitor unauthorized use…

Read more
AI

Enhanced logo detection with AI: A hybrid approach

Phong Nguyen

Executive Summary: Accurate logo detection is essential for protecting brands against misuse and fraudulent activities. Red Sift’s hybrid AI approach enhances detection precision, effectively balancing the reduction of false positives with the identification of genuine threats. This article: Introduction Logo detection is crucial for brand protection, helping identify logo misuse in lookalike domains and fraudulent…

Read more