Detect unauthorized access, suspicious forwarding rules, and hidden inbox filters before attackers can exploit your email. Our comprehensive scanning identifies the persistence mechanisms BEC attackers use.
Email Forwarding
No suspicious forwarding rules detected
Inbox Filters
All filters appear legitimate
Delegate Access
No unauthorized delegates found
Sign-in Activity
1 new device detected this week
BEC attackers maintain access through hidden configuration changes. We scan for the techniques they use to persist in compromised accounts.
Detect suspicious forwarding rules, inbox filters that hide emails, and unauthorized delegate access that attackers use to maintain persistence.
Monitor for security alerts, new device sign-ins, password changes, and recovery setting modifications that indicate account compromise.
Analyze sent email patterns, detect BEC-like message subjects, and identify deleted security notifications that suggest cover-up attempts.
Get protected in three simple steps
Sign in with Google or Microsoft. We request read-only access to analyze your mailbox configuration.
Our system checks forwarding rules, filters, delegates, and audit logs for indicators of compromise.
Get a detailed report of any suspicious configurations with severity ratings and recommended actions.
Secure protection for the platforms you already use
Gmail and Google Workspace accounts with full configuration and audit scanning
Outlook and Microsoft 365 accounts with inbox rule and mail flow analysis
Join organizations that trust CertifID BEC Analyzer to protect their email accounts from business email compromise attacks.
Start Your Free Scan