You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/email-authentication-dkim-configure.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
ms.author: chrisda
6
6
author: chrisda
7
7
manager: deniseb
8
-
ms.date: 1/29/2024
8
+
ms.date: 05/31/2024
9
9
audience: ITPro
10
10
ms.topic: conceptual
11
11
@@ -31,7 +31,7 @@ appliesto:
31
31
32
32
DomainKeys Identified Mail (DKIM) is a method of [email authentication](email-authentication-about.md) that helps validate mail sent from your Microsoft 365 organization to prevent spoofed senders that are used in business email compromise (BEC), ransomware, and other phishing attacks.
33
33
34
-
The primary purpose of DKIM is to verify that a message hasn't been altered in transit. Specifically:
34
+
The primary purpose of DKIM is to verify that a message wasn't altered in transit. Specifically:
35
35
36
36
1. One or more private keys are generated for a domain and are used by the source email system to digitally sign important parts of outbound messages. These message parts include:
37
37
- From, To, Subject, MIME-Version, Content-Type, Date, and other message header fields (depending on the source email system).
@@ -100,7 +100,7 @@ Points to address or value: selector2-<CustomDomain>._domainkey.<InitialDomain>
100
100
101
101
- In Microsoft 365, two public-private key pairs are generated when DKIM signing using a custom domain or subdomain is enabled. The private keys that are used to sign the message are inaccessible. The CNAME records point to the corresponding public keys that are used to verify the DKIM signature. These records are known as _selectors_.
102
102
- Only one selector is active and used when DKIM signing using a custom domain is enabled.
103
-
- The second selector is inactive. It's activated and used only after any future [DKIM key rotation](#rotate-dkim-keys), and then only after the original selector is deactivated.
103
+
- The other selector is inactive. It's activated and used only after any future [DKIM key rotation](#rotate-dkim-keys), and then only after the original selector is deactivated.
104
104
105
105
The selector that's used to verify the DKIM signature (which infers the private key that was used to sign the message) is stored in the **s=** value in the **DKIM-Signature** header field (for example, `s=selector1-contoso-com`).
106
106
@@ -115,7 +115,7 @@ For example, your organization has the following domains in Microsoft 365:
-**Custom domains**: cohovineyard.com and cohowinery.com
117
117
118
-
You need to create two CNAME records in each custom domain, for a total of four CNAME records:
118
+
You need to create two CNAME records in DNS in each custom domain, for a total of four CNAME records:
119
119
120
120
-**CNAME records in the cohovineyard.com domain**:
121
121
@@ -265,7 +265,7 @@ If you'd rather use PowerShell to enable DKIM signing of outbound messages using
265
265
> [!TIP]
266
266
> Before you can configure DKIM signing using the custom domain, you need to add the domain to Microsoft 365. For instructions, see [Add a domain](/microsoft-365/admin/setup/add-domain#add-a-domain). To confirm that the custom domain is available for DKIM configuration, run the following command: `Get-AcceptedDomain`.
267
267
>
268
-
> As described earlier in this article, your \*.onmicrosoft.com domain is already signing outbound email by default. Typically, unless you've manually configured DKIM signing for the \*.onmicrosoft.com domain in the Defender portal or in PowerShell, the \*.onmicrosoft.com doesn't appear in the output of **Get-DkimSigningConfig**.
268
+
> As described earlier in this article, your \*.onmicrosoft.com domain is already signing outbound email by default. Typically, unless you manually configured DKIM signing for the \*.onmicrosoft.com domain in the Defender portal or in PowerShell, the \*.onmicrosoft.com doesn't appear in the output of **Get-DkimSigningConfig**.
269
269
270
270
1. Run the following command to verify the availability and DKIM status of all domains in the organization:
271
271
@@ -432,7 +432,7 @@ To confirm the corresponding public key that's used to verify the DKIM signature
432
432
433
433
6. After four days (96 hours), the new DKIM key begins to sign outbound messages for the custom domain. Until then, the current DKIM key is used.
434
434
435
-
You can tell when the new DKIM key is being used when the **Status** value changes from **Rotating keys for this domain and signing DKIM signatures** to **Signing DKIM signatures for this domain**.
435
+
The new DKIM key is being used to sign message when the **Status** value changes from **Rotating keys for this domain and signing DKIM signatures** to **Signing DKIM signatures for this domain**.
436
436
437
437
To confirm the corresponding public key that's used to verify the DKIM signature (which infers the private key that was used to sign the message), check the **s=** value in the **DKIM-Signature** header field (the selector; for example, `s=selector1-contoso-com`).
438
438
@@ -613,7 +613,7 @@ In this example, the following steps are required:
613
613
4. If the destination email system checks DKIM on inbound messages, the messages pass DKIM because they're DKIM signed.
614
614
5. If the destination email system checks DMARC on inbound messages, the domain in the DKIM signature (the **d=** value in the **DKIM-Signature** header field) matches the domain in the From address that's shown in email clients, so the messages can also pass DMARC:
@@ -626,4 +626,4 @@ As described in [How SPF, DKIM, and DMARC work together to authenticate email me
626
626
For mail coming _into_ Microsoft 365, you might also need to configure trusted ARC sealers if you use services that modify messages in transit before delivery to your organization. For more information, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).
627
627
628
628
> [!TIP]
629
-
> Exchange 2016 and Exchange 2019 are known to modify messages that flow through them, which can impact DKIM.
629
+
> Exchange 2016 and Exchange 2019 are known to modify messages that flow through them, which can affect DKIM.
0 commit comments