Forensic Reports (RUF)
Forensic reports provide message-level detail about individual emails that failed DMARC authentication. Unlike aggregate reports (which give daily summaries), forensic reports show you exactly what happened with specific messages.
Forensic report analysis is available on Pro, Business, and Enterprise plans.
What Forensic Reports Contain
- Email headers — From, To, Subject, Date (with privacy redaction)
- Authentication results — SPF, DKIM, and DMARC pass/fail details
- Sender IP — The IP address that sent the message
- Failure reason — Why authentication failed (misaligned domain, invalid DKIM signature, etc.)
- Disposition — What action the receiving server took
Viewing Forensic Reports
Navigate to Threat Intelligence → Forensic Reports (RUF). Filter by:
- Date range
- Failure reason (SPF, DKIM, alignment)
- Source IP address
- Domain
Investigating Failures
Click any report to see the full details. Use forensic data to:
- Identify the source of spoofing attempts
- Debug authentication problems with legitimate senders
- Build evidence for security incident reports
Receiving Forensic Reports
Your DMARC record must include the ruf tag to receive forensic reports:
v=DMARC1; p=reject; rua=mailto:[email protected]; ruf=mailto:[email protected]; fo=1
The fo=1 tag requests forensic reports for any authentication failure (not just DMARC failures).
Not all mail servers send forensic reports. Google, for example, does not send RUF reports. Microsoft and Yahoo do send them for some failures.