Skip to content

Commit 590bbe4

Browse files
Merge pull request #5218 from MicrosoftDocs/main
[AutoPublish] main to live - 10/06 19:46 PDT | 10/07 08:16 IST
2 parents e0f9f9a + 0c24fa0 commit 590bbe4

File tree

2 files changed

+19
-18
lines changed

2 files changed

+19
-18
lines changed

defender-office-365/email-authentication-dkim-configure.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
8-
ms.date: 06/19/2025
8+
ms.date: 10/06/2025
99
audience: ITPro
1010
ms.topic: how-to
1111

@@ -51,15 +51,15 @@ Important facts about DKIM:
5151

5252
Before we get started, here's what you need to know about DKIM in Microsoft 365 based on your email domain:
5353

54-
- **If you use only the Microsoft Online Email Routing Address (MOERA) domain for email (for example, contoso.onmicrosoft.com)**: You don't need to do anything. Microsoft automatically creates a 2048-bit public-private key pair from your initial \*.onmicrosoft.com domain. Outbound messages are automatically DKIM signed using the private key. The public key is published in a DNS record so destination email systems can verify the DKIM signature of messages.
54+
- **If you use only the Microsoft Online Email Routing Address (MOERA) domain for email (for example, contoso.onmicrosoft.com)**: You don't need to do anything. Outbound messages from senders in the contoso.onmicrosoft.com domain are automatically DKIM signed by the contoso.onmicrosoft.com domain.
5555

5656
But, you can also manually configure DKIM signing using the \*.onmicrosoft.com domain. For instructions, see the [Use the Defender portal to customize DKIM signing of outbound messages using the \*.onmicrosoft.com domain](#use-the-defender-portal-to-customize-dkim-signing-of-outbound-messages-using-the-onmicrosoftcom-domain) section later in this article.
5757

58-
To verify the fact that outbound messages are automatically DKIM signed, see the [Verify DKIM signing of outbound mail from Microsoft 365](#verify-dkim-signing-of-outbound-mail-from-microsoft-365) section later in this article.
58+
To verify outbound messages from senders in the initial \*.onmicrosoft.com domain are DKIM signed, see the [Verify DKIM signing of outbound mail from Microsoft 365](#verify-dkim-signing-of-outbound-mail-from-microsoft-365) section later in this article.
5959

6060
For more information about \*.onmicrosoft.com domains, see [Why do I have an "onmicrosoft.com" domain?](/microsoft-365/admin/setup/domains-faq#why-do-i-have-an--onmicrosoft-com--domain).
6161

62-
- **If you use one or more custom domains for email (for example, contoso.com)**: Even though the MOERA domain signs all outbound mail from Microsoft 365, you still have more work to do for maximum email protection:
62+
- **If you use one or more custom domains for email (for example, contoso.com)**: Currently, no DKIM signing occurs for outbound mail from custom domains, so you need to do the following steps for maximum email protection:
6363
- **Configure DKIM signing using custom domains or subdomains**: A message needs to be DKIM signed by the domain in the From address. We also recommend configuring DMARC, and DKIM passes DMARC validation only if the domain that DKIM signed the message and the domain in the From address align.
6464

6565
- **Subdomain considerations**:
@@ -157,8 +157,6 @@ You need to create two CNAME records in DNS in each custom domain, for a total o
157157
### Use the Defender portal to enable DKIM signing of outbound messages using a custom domain
158158
159159
> [!TIP]
160-
> Enabling DKIM signing of outbound messages using a custom domain effectively switches DKIM signing from using the initial \*.onmicrosoft.com domain to using the custom domain.
161-
>
162160
> You can use a custom domain or subdomain to DKIM sign outbound mail only after the domain is successfully added to Microsoft 365. For instructions, see [Add a domain](/microsoft-365/admin/setup/add-domain#add-a-domain).
163161
>
164162
> The main factor that determines when a custom domain starts DKIM signing outbound mail is the CNAME record detection in DNS.
@@ -207,6 +205,15 @@ Proceed if the domain satisfies these requirements.
207205
**Hostname**: `selector2._domainkey`<br>
208206
**Points to address or value**: `selector2-contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft`
209207

208+
> [!TIP]
209+
> As previously described in the [Syntax for DKIM CNAME records](#syntax-for-dkim-cname-records), your domain might require the old record syntax:
210+
>
211+
> Hostname: `selector1._domainkey`
212+
> Points to address or value: `selector1-contoso-com._domainkey.contoso.onmicrosoft.com`
213+
>
214+
> Hostname: `selector2._domainkey`
215+
> Points to address or value: `selector2-contoso-com._domainkey.contoso.onmicrosoft.com`
216+
210217
Copy the information from the error dialog (select the text and press CTRL+C), and then select **OK**.
211218

212219
Leave the domain details flyout open.
@@ -234,9 +241,7 @@ Proceed if the domain satisfies these requirements.
234241

235242
### Use the Defender portal to customize DKIM signing of outbound messages using the \*.onmicrosoft.com domain
236243

237-
As described earlier in this article, the initial \*.onmicrosoft.com domain is automatically configured to sign all outbound mail from your Microsoft 365 organization, and you should [configure custom domains to DKIM sign outbound messages](#use-the-defender-portal-to-enable-dkim-signing-of-outbound-messages-using-a-custom-domain).
238-
239-
But, you can also use the procedures in this section to affect DKIM signing using the \*.onmicrosoft.com domain:
244+
As described earlier in this article, outbound mail from senders in the initial \*.onmicrosoft.com domain is automatically DKIM signed by the initial \*.onmicrosoft.com domain. But, you can use the procedures in this section to affect DKIM signing using the \*.onmicrosoft.com domain:
240245

241246
- Generate new keys. The new keys are automatically added and used in the Microsoft 365 datacenters.
242247
- Have the properties of the \*.onmicrosoft.com domain appear correctly in the details flyout of the domain on the **DKIM** tab of the **Email authentication settings** page at <https://security.microsoft.com/authentication?viewid=DKIM> or in PowerShell. This result allows for future operations on the DKIM configuration for the domain (for example, [manual key rotation](#rotate-dkim-keys)).
@@ -279,12 +284,12 @@ Proceed if the domain satisfies these requirements.
279284

280285
### Use Exchange Online PowerShell to configure DKIM signing of outbound messages
281286

282-
If you'd rather use PowerShell to enable DKIM signing of outbound messages using a custom domain, or to customize DKIM signing for the \*.onmicrosoft.com domain, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
287+
If you'd rather use PowerShell to enable DKIM signing of outbound messages using a custom domain, or to customize DKIM signing for the initial \*.onmicrosoft.com domain, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
283288

284289
> [!TIP]
285290
> Before you can configure DKIM signing using the custom domain, you need to add the domain to Microsoft 365. For instructions, see [Add a domain](/microsoft-365/admin/setup/add-domain#add-a-domain). To confirm that the custom domain is available for DKIM configuration, run the following command: `Get-AcceptedDomain`.
286291
>
287-
> As described earlier in this article, your \*.onmicrosoft.com domain is already signing outbound email by default. Typically, unless you manually configured DKIM signing for the \*.onmicrosoft.com domain in the Defender portal or in PowerShell, the \*.onmicrosoft.com doesn't appear in the output of **Get-DkimSigningConfig**.
292+
> As described earlier in this article, your \*.onmicrosoft.com domain is already signing outbound email from senders in the \*.onmicrosoft.com by default. Typically, unless you manually configured DKIM signing for the \*.onmicrosoft.com domain in the Defender portal or in PowerShell, the \*.onmicrosoft.com doesn't appear in the output of **Get-DkimSigningConfig**.
288293
289294
1. Run the following command to verify the availability and DKIM status of all domains in the organization:
290295

@@ -358,7 +363,7 @@ If you'd rather use PowerShell to enable DKIM signing of outbound messages using
358363
359364
It takes a few minutes (or possibly longer) for Microsoft 365 to detect the new CNAME records that you created.
360365
361-
- **\*.onmicrosoft.com domain**: Go to Step 5.
366+
- **\*.onmicrosoft.com domain**: Go to the next step.
362367
363368
5. After a while, return to Exchange Online PowerShell, replace \<Domain\> with the domain that you configured, and run the following command:
364369
@@ -505,10 +510,6 @@ For detailed syntax and parameter information, see the following articles:
505510

506511
## Disable DKIM signing of outbound messages using a custom domain
507512

508-
As described earlier in this article, enabling DKIM signing of outbound messages using a custom domain effectively switches DKIM signing from using the \*.onmicrosoft.com domain to using the custom domain.
509-
510-
When you disable DKIM signing using a custom domain, you aren't completely disabling DKIM signing for outbound mail. DKIM signing eventually switches back to using the \*.onmicrosoft domain.
511-
512513
### Use the Defender portal to disable DKIM signing of outbound messages using a custom domain
513514

514515
1. In the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Email authentication settings** page. Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.

defender-office-365/tenant-allow-block-list-teams-domains-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to block domains in Microsoft Teams using the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 08/04/2025
18+
ms.date: 10/06/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -53,7 +53,7 @@ This article describes how security admins can manage entries for blocked domain
5353

5454
- Block entries for domains in Teams never expire.
5555

56-
- An entry should be active within 5 minutes.
56+
- An entry should be active within 24 hours.
5757

5858
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
5959
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup>, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.

0 commit comments

Comments
 (0)