{"id":21373,"date":"2026-02-12T06:45:00","date_gmt":"2026-02-12T05:45:00","guid":{"rendered":"https:\/\/coreit.se\/okategoriserad\/how-does-dkim-work-in-microsoft-365"},"modified":"2026-03-26T07:26:02","modified_gmt":"2026-03-26T06:26:02","slug":"how-does-dkim-work-in-microsoft-365","status":"publish","type":"post","link":"https:\/\/coreit.se\/en\/faq\/how-does-dkim-work-in-microsoft-365","title":{"rendered":"How does DKIM work in Microsoft 365?"},"content":{"rendered":"\n<div class=\"custom-ai-wrapper\">\n  <h2 class=\"ai-question\">How DKIM works in Microsoft 365 &#8211; digital signing for email security<\/h2>\n\n  <div class=\"ai-summary\">\n    <p>DKIM (DomainKeys Identified Mail) in Microsoft 365 is a security feature that digitally signs outgoing email, verifying that the message has not been altered during transmission. By combining DKIM with SPF and DMARC, receiving servers can ensure that the email really comes from the company&#8217;s domain and has not been tampered with. This reduces the risk of phishing, spoofing and delivery problems.  <\/p>\n  <\/div>\n\n  <div class=\"ai-columns\">\n    <div class=\"ai-background\">\n      <h2>Background and overview<\/h2>\n      <p>DKIM is an email authentication standard that protects your brand and improves delivery reliability. In Microsoft 365, DKIM is used to digitally sign messages. This allows receiving servers to verify that the content has not been tampered with.  <\/p>\n\n      <h3>What is DKIM?<\/h3>\n      <p>DKIM uses cryptographic keys to sign the email headers. This allows the recipient to verify that the message is unaltered and has indeed been sent from the specified domain. <\/p>\n\n      <h3>How DKIM works in practice<\/h3>\n      <p>Outgoing emails are signed with a private key stored in Microsoft 365. Receiving servers retrieve the public key from DNS and verify the signature. This ensures that the message is authentic.  <\/p>\n\n      <h3>Advantages of DKIM<\/h3>\n      <p>DKIM reduces the risk of email spoofing and phishing, strengthens domain reputation and improves the deliverability of legitimate email.<\/p>\n\n      <h3>DKIM together with SPF and DMARC<\/h3>\n      <p>Along with SPF and DMARC, DKIM contributes to robust email authentication that verifies both sender and message integrity.<\/p>\n\n      <h3>Activation in Microsoft 365<\/h3>\n      <p>Administrators can enable DKIM via the Microsoft 365 Security &#038; Compliance Center or PowerShell. The domain must have correct DNS records for the public key. <\/p>\n\n      <h3>Monitoring and reporting<\/h3>\n      <p>Administrators can use DMARC reports to monitor DKIM signatures and identify problems with email authentication or unauthorized senders.<\/p>\n\n      <h3>Common mistakes<\/h3>\n      <p>Common errors include incorrectly configured DNS records, incomplete activation for all domains, or conflicts with third-party email providers.<\/p>\n    <\/div>\n\n    <div class=\"ai-right\">\n      <div class=\"ai-details\">\n        <h2>Key points about DKIM in Microsoft 365<\/h2>\n        <ul>\n          <li><strong>Digital signature:<\/strong> Ensures that emails have not been tampered with during transmission.<\/li>\n          <li><strong>Verification via DNS:<\/strong> The receiving server uses the public key to validate the signature.<\/li>\n          <li><strong>Spoofing protection:<\/strong> prevents attackers from sending emails in the company&#8217;s name.<\/li>\n          <li><strong>Integration with SPF and DMARC:<\/strong> Creates a complete email authentication.<\/li>\n          <li><strong>Improved delivery reliability:<\/strong> legitimate messages reach recipients without being flagged as spam.<\/li>\n          <li><strong>Monitoring and reporting:<\/strong> Identifies problems and suspicious senders via DMARC reports.<\/li>\n        <\/ul>\n      <\/div>\n\n      <div class=\"ai-faq\">\n        <h2>Related questions<\/h2>\n\n        <div>\n          <h3>What is DKIM in Microsoft 365?<\/h3>\n          <p>DKIM is a security standard that digitally signs emails to verify that they come from the correct domain and have not been tampered with.<\/p>\n        <\/div>\n\n        <div>\n          <h3>How to activate DKIM?<\/h3>\n          <p>The administrator enables DKIM via Microsoft 365 Security &#038; Compliance Center or PowerShell and ensures correct DNS configuration.<\/p>\n        <\/div>\n\n        <div>\n          <h3>Why use DKIM together with SPF and DMARC?<\/h3>\n          <p>To create a strong authentication that verifies both the sender and the integrity of the message and reduces the risk of spoofing.<\/p>\n        <\/div>\n\n        <div>\n          <h3>Can DKIM prevent phishing completely?<\/h3>\n          <p>No, but it significantly reduces the risk when used in conjunction with SPF, DMARC and user training.<\/p>\n        <\/div>\n\n        <div>\n          <h3>What happens if DKIM does not work?<\/h3>\n          <p>Incorrect configuration can lead to legitimate emails being flagged as spam or not delivered.<\/p>\n        <\/div>\n\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Vad \u00e4r DKIM i Microsoft 365?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"DKIM \u00e4r en s\u00e4kerhetsstandard som digitalt signerar e-post f\u00f6r att verifiera att den kommer fr\u00e5n r\u00e4tt dom\u00e4n och inte har manipulerats.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Hur aktiverar man DKIM?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Administrat\u00f6ren aktiverar DKIM via Microsoft 365 Security & Compliance Center eller PowerShell och s\u00e4kerst\u00e4ller korrekt DNS-konfiguration.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Varf\u00f6r anv\u00e4nda DKIM tillsammans med SPF och DMARC?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"F\u00f6r att skapa en stark autentisering som verifierar b\u00e5de avs\u00e4ndare och meddelandets integritet samt minskar risken f\u00f6r spoofing.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Kan DKIM f\u00f6rhindra phishing helt?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Nej, men det minskar risken avsev\u00e4rt n\u00e4r det anv\u00e4nds tillsammans med SPF, DMARC och anv\u00e4ndarutbildning.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Vad h\u00e4nder om DKIM inte fungerar?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Felaktig konfiguration kan leda till att legitima e-postmeddelanden flaggas som spam eller inte levereras.\"\n      }\n    }\n  ]\n}\n<\/script>\n\n","protected":false},"excerpt":{"rendered":"<p>How DKIM works in Microsoft 365 &#8211; digital signing for email security DKIM (DomainKeys Identified Mail) in Microsoft 365 is a security feature that digitally signs outgoing email, verifying that the message has not been altered during transmission. By combining DKIM with SPF and DMARC, receiving servers can ensure that the email really comes from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15862,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[178,181],"tags":[],"class_list":["post-21373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-faq","category-microsoft-365"],"acf":[],"_links":{"self":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/posts\/21373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/comments?post=21373"}],"version-history":[{"count":0,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/posts\/21373\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/media\/15862"}],"wp:attachment":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/media?parent=21373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/categories?post=21373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tags?post=21373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}