Description
What Is Impersonation?
How Shield Protects Against Impersonation
Shield combines several pieces of information to determine if a message should be flagged as Impersonation. These include:
- SPF: The sending email server is not listed in the domain's SPF record
- DKIM: The DKIM signature cannot be verified against the sending domain.
- DMARC: The DMARC authentication checks fail for any reason, and the policy is set to reject.
-
Name Matching and Homographic Spoofing: Shield checks whether the display name in the From address matches the name associated with that email in the Global Address List. This is an organizational heuristic used to detect potential impersonation.
Shield also flags signs of homographic spoofing—a technique where visually similar characters from different alphabets (e.g., Cyrillic and Latin) are used to create deceptive email addresses. These characters can appear in the From, Reply-To, or display name fields, making the message look legitimate to the human eye while hiding its true origin. For example, the Cyrillic "А" in "Аdele@blueboxhq.com" looks identical to the Latin "A" in "Adele@blueboxhq.com".
The default risk level for Impersonation is set to High, as a match for Impersonation has a high confidence that the message is from someone other than the anticipated sender.
Shield’s Possible Impersonation Risk Level
Possible Impersonation indicates that the message contained characteristics sometimes used to impersonate senders. These characteristics are lower confidence, since some legitimate emails also include the same characteristics. By default, Possible Impersonation is set to low risk, but can be increased if desired.
Getting Help
If you need assistance with impersonation in Shield, please contact the Partner Success team.
Related to
Updated