What is DKIM?

Definition and its use for e-mail security

Home » Knowledge Base » DKIM (DomainKeys Identified Mail)

This article explains how DKIM authentication works, how it helps prevent email fraud, and how various email providers, such as Microsoft 365, implement their own DKIM settings to enhance security.

What is DKIM (DomainKeys Identified Email)?

DomainKeys Identified Mail (DKIM) is an email verification process that validates with a digital signature that an email came from the intended organization. When activated, DKIM validation happens automatically at the server level before ever reaching the recipient, authenticating the incoming email, so the receiver knows it’s legitimate and not malicious.

How to use DKIM

Before the message reaches the recipient, it undergoes a process of authentication. The inbound mail server intercepts the message and fetches the sender’s public DKIM signature from the sender’s DNS (domain name system) records. It then compares the private and public signature to see if they match. If they do, the inbound mail server authenticates the email and delivers it to the recipient. Otherwise, it drops the message and causes the delivery to fail.

Each email provider generally uses their own DKIM signatures. Microsoft provides here some information regarding DKIM settings in Microsoft 365. You can also check out our support page for a guide on how to set up DKIM.

Learn about HORNETSECURITY’S SERVICES

Service Thumbnail : VM Backup
Service

VM Backup

A powerful, reliable and easy-to-use backup and replication solution for Microsoft Hyper-V and VMware virtual machines (VMs).

Read more

Did you like our contribution to DKIM? Then other articles in our knowledge base might interest you as well! We help you learn more about cybersecurity related topics such as EmotetTrojans, IT SecurityCryptolocker RansomwarePhishingGoBDCyber Kill Chain and Computer Worms.