Authentication controls
Review the records that determine whether sender identity is trusted.
- SPF validation and flattening pressure
- DKIM selector discovery and key context
- DMARC policy parsing and enforcement guidance
Privacy controls
CyberFurl can load analytics only after you opt in. Core product features work without analytics consent.
Inspect the full SPF record, DKIM selectors, DMARC policy, MX routing, BIMI, MTA-STS, TLS-RPT, and DANE together so email trust can be debugged from one page.
Target keyword
Inspect the full SPF record and lookup count pressure.
Review selectors, discovered keys, and signing hygiene.
Parse enforcement, subdomain policy, reporting, and coverage.
Include MX, BIMI, MTA-STS, TLS-RPT, and DANE context.
Overview
Audit SPF, DKIM, DMARC, MX, MTA-STS, TLS-RPT, and BIMI in one place so spoofing resistance and deliverability are easier to own.
This page should answer the questions teams actually ask during mail incidents: Is SPF too broad? Which DKIM selectors are present? Is DMARC enforcing or just reporting? What MX hosts are live? Are MTA-STS and TLS-RPT configured or missing?
That is why the page groups authentication, routing, and transport controls together. It gives security, IT, and deliverability owners one place to validate sender trust instead of juggling separate SPF, DKIM, DMARC, and MX utilities.
What this page covers
Capabilities
These are the actual product surfaces teams use to inspect, explain, and monitor this part of the external security posture.
Review the records that determine whether sender identity is trusted.
Surface the controls that support secure delivery beyond basic authentication.
Keep email trust posture visible after migrations, vendor changes, and DNS edits.
Research-backed priorities
Each card below ties current official guidance or large-scale threat research to the operational reason teams usually put this control on a schedule.
Google’s sender guidelines require all senders to publish SPF or DKIM, and bulk senders to publish SPF, DKIM, and DMARC. Messages that miss those controls are more likely to be rejected or sent to spam.
What Teams Operationalize
That turns missing DMARC, broken DKIM, or incomplete SPF coverage into a production issue for any brand that depends on email trust or revenue email.
Google says email sent to personal Gmail accounts needs a DKIM key of at least 1024 bits and recommends 2048-bit keys, and its sender FAQ says full DMARC alignment is likely to become a stronger requirement over time.
What Teams Operationalize
The useful product requirement is selector discovery, key-length visibility, and clear SPF-versus-DKIM alignment output rather than a single generic pass badge.
Google recommends setting up SPF and DKIM at least 48 hours before DMARC, running p=none for about a week, then moving to quarantine in small percentages such as 1% for large senders or 10% for small organizations while reviewing reports daily.
What Teams Operationalize
Teams buy email posture tooling when they need the page to show p=, sp=, pct=, rua=, ruf=, alignment issues, and rollout-ready next steps instead of just “DMARC present.”
Internal links
Use the adjacent product surfaces to validate the same issue from multiple angles and move from explanation into remediation or monitoring.
Related features
These adjacent workflows help teams connect one external signal to the rest of the domain’s public attack surface.
FAQ
These are the implementation and buying questions security teams usually ask before they turn this check into an owned workflow.
Use a workflow that inspects SPF, DKIM, DMARC, MX, and supporting transport controls together so you can see whether the mail stack is actually coherent, not just whether one record exists.
Yes. It includes SPF, DKIM, MX, BIMI, MTA-STS, TLS-RPT, DANE, PTR, and related evidence so the email security narrative is complete.
Because sender trust depends on how those controls work together. A DMARC record alone is not enough if SPF is weak, DKIM coverage is inconsistent, or mail routing is misconfigured.
Yes. It is useful for both security and deliverability work because it shows authentication posture, policy gaps, and transport signals that often explain why mail trust is breaking.
Next step
Start with a live report on the public domain, then move the same checks into recurring monitoring with saved history, clearer evidence, and operator-ready follow-up.