Check your email security setup in 30 seconds

Investigate is a free tool that instantly verifies if your email security is set up to block email impersonation and what to do if it isn’t!

How does DMARC block email impersonation?

DMARC stands for Domain-based, Messaging, Authentication, Reporting and Conformance. It was ratified so that domain owners could take back control of their email identity, by telling receiving inboxes to reject fake emails impersonating their organization (also known as spoofs). By authenticating an email’s origin with DMARC, email deliverability also improves.

How will Investigate help me with DMARC?

Investigate gives you an easy-to-digest overview of your DMARC setup in seconds, including actionable next steps if something is not configured as it should be.

Two key email security protocols DMARC looks for:

The status of SPF, DKIM, and DMARC is hidden in the email header when you send an email from any of your services. In a matter of seconds and free of charge, Investigate allows you to decrypt these details into meaningful insight and instantly better understand your email setup.

Check email DMARC setup

Here’s how Investigate works in 2 simple steps

Step 1 – Send an email to Investigate’s inbox
Investigate has a unique inbox that will instantly assess your email security. Simply send an email to its address from the sending service you wish to check.

Step 2 – Get the results!
Once your email is sent, your results for DMARC will be revealed with full insight into other areas including SPF, DKIM, TLS and FCrDNS.

The results are clearly presented in a card format, one for each security protocol as shown below:

Each card contains detailed information about the protocol and why it passed or failed. All of the highlighted keywords link to the glossary on our OnDMARC Knowledge Base should you need further information. If you’re struggling to understand your email security setup or looking to take your first steps to improve email deliverability, try investigate today!


Clare Holmes

12 Feb. 2020



Recent Posts


The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more

Navigating the “SubdoMailing” attack: How Red Sift proactively identified and remediated a…

Rebecca Warren

In the world of cybersecurity, a new threat has emerged. Known as “SubdoMailing,” this new attack cunningly bypasses some of the safeguards that DMARC sets up to protect email integrity.  In this blog we will focus on how the strategic investments we have made at Red Sift allowed us to discover and protect against…

Read more

Where are we now? One month of Google and Yahoo’s new requirements…

Rebecca Warren

As of March 1, 2024, we are one month into Google and Yahoo’s new requirements for bulk senders. Before these requirements went live, we used Red Sift’s BIMI Radar to understand global readiness, and the picture wasn’t pretty.  At the end of January 2024, one-third of global enterprises were bound to fail the new…

Read more