workspace-administrator video for your organization has recently experienced an increase in email spoofing attacks. As a Google Workspace Administrator, you've
Your organization has recently experienced an increase in email spoofing attacks. As a Google Workspace Administrator, you've been assigned the task to identify and troubleshoot the issue. You suspect that some custom configurations could be at the root of the problem. Which of the following steps is the most effective initial action to identify if custom configurations are causing the vulnerability?