AI Anomaly Detection
AI Anomaly Detection continuously monitors your DMARC data for unusual patterns that may indicate spoofing attacks, configuration issues, or other security events. By establishing a baseline of normal email sending behavior for your domain, the system can identify deviations and generate alerts when something unexpected occurs.
AI Anomaly Detection is available on Pro, Business, and Enterprise plans. The system begins learning your domain's baseline patterns as soon as DMARC data starts flowing into SpoofWard. Allow at least 7 days of data collection for accurate anomaly detection.
How It Works
The AI engine analyzes your incoming DMARC aggregate reports and builds a model of your domain's normal email behavior. This model includes expected sending volumes, known sending sources, typical authentication pass rates, and geographic distribution patterns. When new data deviates significantly from this baseline, an anomaly is detected and an alert is generated.
The detection process runs automatically in the background each time new DMARC data is received. No manual configuration is required to activate anomaly detection — it starts working as soon as sufficient historical data is available.
Types of Anomalies Detected
The system monitors for four primary categories of anomalies:
Volume Spikes
A sudden and significant increase in the number of messages sent from your domain. Volume spikes may indicate that an attacker is running a large-scale spoofing campaign using your domain, or that a compromised account is being used to send spam. The system compares current volume against your historical average and flags deviations that exceed the expected range.
New Unauthorized Sources
The appearance of a previously unseen sending source in your DMARC data. While new sources can sometimes be legitimate (a new marketing tool, for example), they can also indicate unauthorized use of your domain. The system flags any source that has not been seen before so you can verify whether it is expected.
Authentication Rate Drops
A significant decline in your SPF or DKIM pass rate. If your DMARC compliance rate drops suddenly, it could mean that a legitimate sender has misconfigured their authentication, that your DNS records have been changed or corrupted, or that attackers are sending unauthenticated email using your domain. Even small drops in pass rates can signal problems that need investigation.
Geographic Anomalies
Email sending activity detected from a country or region where your domain has not previously sent email. Geographic anomalies are a strong indicator of spoofing, as attackers often operate from different regions than your legitimate infrastructure. The system uses the Geolocation Analytics baseline to identify unexpected geographic origins.
Anomaly Alerts
When an anomaly is detected, SpoofWard generates an alert containing the following information:
- Anomaly type — The category of anomaly detected (volume spike, new source, auth rate drop, or geographic)
- Severity level — Rated as Low, Medium, High, or Critical based on the magnitude of the deviation and its potential impact
- Description — A human-readable summary of what was detected and why it is unusual
- Affected domain — The domain where the anomaly was observed
- Time window — The period during which the anomalous activity occurred
- Supporting data — Relevant metrics such as message counts, IP addresses, countries, and pass/fail rates that support the finding
Alerts are delivered through your configured Alert Channels, including email, Slack, Microsoft Teams, and webhooks. You can customize which anomaly types and severity levels trigger notifications in Alert Rules.
Not every anomaly is a threat. Legitimate events such as launching a new email campaign, onboarding a new email service provider, or seasonal sending volume changes can trigger anomaly alerts. Always investigate the alert context before taking action. Over time, as you acknowledge false positives, the system refines its baseline model.
Investigating Anomalies
When you receive an anomaly alert, follow these steps to investigate:
- Review the alert details — Check the anomaly type, severity, and supporting data to understand what was detected
- Cross-reference with known changes — Determine if any legitimate changes (new sender, DNS updates, marketing campaign) could explain the anomaly
- Check the source — Use Email Source Discovery to identify the sending source and verify whether it is authorized
- Review geolocation data — For geographic anomalies, use the Geolocation Analytics map to see where the activity originated
- Take action — If the anomaly is confirmed as malicious, add the source to your Block Rules and consider tightening your DMARC policy to
p=reject
Baseline Learning Period
The AI engine requires a minimum of 7 days of DMARC data to establish a reliable baseline. During this initial learning period, anomaly detection may not trigger alerts or may produce less accurate results. After 30 days of data collection, the baseline becomes robust and the system operates at full accuracy.
AI Anomaly Detection works best when combined with AI Source Classification. When an anomaly flags a new source, the classification engine can immediately tell you what type of sender it appears to be, speeding up your investigation.