Check your email security setup in 30 seconds

Investigate is a free tool that instantly verifies if your email security is set up to block email impersonation and what to do if it isn’t!

How does DMARC block email impersonation?

DMARC stands for Domain-based, Messaging, Authentication, Reporting and Conformance. It was ratified so that domain owners could take back control of their email identity, by telling receiving inboxes to reject fake emails impersonating their organization (also known as spoofs). By authenticating an email’s origin with DMARC, email deliverability also improves.

How will Investigate help me with DMARC?

Investigate gives you an easy-to-digest overview of your DMARC setup in seconds, including actionable next steps if something is not configured as it should be.

Two key email security protocols DMARC looks for:

The status of SPF, DKIM, and DMARC is hidden in the email header when you send an email from any of your services. In a matter of seconds and free of charge, Investigate allows you to decrypt these details into meaningful insight and instantly better understand your email setup.

Check email DMARC setup

Here’s how Investigate works in 2 simple steps

Step 1 – Send an email to Investigate’s inbox
Investigate has a unique inbox that will instantly assess your email security. Simply send an email to its address from the sending service you wish to check.

Step 2 – Get the results!
Once your email is sent, your results for DMARC will be revealed with full insight into other areas including SPF, DKIM, TLS and FCrDNS.

The results are clearly presented in a card format, one for each security protocol as shown below:

Each card contains detailed information about the protocol and why it passed or failed. All of the highlighted keywords link to the glossary on our OnDMARC Knowledge Base should you need further information. If you’re struggling to understand your email security setup or looking to take your first steps to improve email deliverability, try investigate today!

PUBLISHED BY

Clare Holmes

12 Feb. 2020

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BIMI

VMC and CMC updates: 5 key takeaways

Jack Lilley

Verified Mark Certificates (VMCs) and Common Mark Certificates (CMCs) continue to evolve, and staying up to date is crucial for organizations looking to authenticate their logos and enhance brand trust in email communication, this includes adhering to version 1.7 of the Minimum Security Requirements.  In this blog, we break down the 5 key changes…

Read more
Certificates

Let’s Encrypt & Red Sift webinar recap: A new era for certificate…

Francesca Rünger-Field

Every day, businesses rely on TLS certificates to keep their digital operations secure. But when those certificates expire unexpectedly, the consequences can be severe—websites go down, critical services break, and customer trust is lost. Even as automation has made certificate issuance and renewal easier, it hasn’t eliminated the problem. Organizations still find themselves blindsided…

Read more
Cybersecurity

Moving cybersecurity upstream to achieve resilience

Sean Costigan

The traditional approach to cybersecurity—often tacked on as an afterthought—needs a serious overhaul. This was the consensus in the recent MN-ISSA sponsored fireside chat titled “Moving Cybersecurity Upstream to Achieve Resilience,” where industry experts gathered to explore the integration of security measures right from the early stages of software development and strategic planning. Held…

Read more
Certificates

Six-day certificates: Here’s what you need to know

Francesca Rünger-Field

In January 2025, Let’s Encrypt announced a major step forward in enhancing web security: the introduction of six-day certificates, also known as “short-lived” certificates. This initiative aligns with Let’s Encrypt’s commitment to strengthening the Public Key Infrastructure (PKI) ecosystem and is set to roll out for general availability by the end of 2025. Why…

Read more