How to Set Up DKIM for Microsoft 365

Email authentication expectations keep rising. Mailbox providers now assume DKIM is present, correctly configured, and actively signing mail.

If you send email through Microsoft 365, DKIM is not enabled by default. That surprises many teams. Without DKIM, your domain is easier to spoof, and your legitimate mail carries less trust.

What DKIM Does in Microsoft 365

DKIM signs outgoing messages using a private key held by Microsoft. Receiving servers fetch the public key from your DNS to verify authenticity.

The result is simple: your domain proves ownership of the message, and that message proves it was not altered. This trust feeds directly into inbox placement and DMARC alignment.

No DKIM means weaker signals. Weaker signals mean more filtering.

We’ve talked about SPF in the past. You can learn more about that here

Phase 1: Access DKIM Settings in Microsoft 365

Microsoft handles DKIM through the Defender portal, not the main admin dashboard.

  1. Sign in to the Microsoft 365 Admin Centre.
  2. Open Microsoft Defender.
  3. Navigate to Email & collaboration, then Policies & rules.
  4. Select Threat policies, then DKIM.
  5. Choose the domain you want to configure.

At this point, DKIM will show as disabled, even for active domains.

That is expected.

Phase 2: Publish DKIM Records in DNS

Microsoft provides two CNAME records per domain.
These point your domain to Microsoft’s DKIM infrastructure.

You will see records similar to:

     selector1._domainkey.yourdomain.com
     selector2._domainkey.yourdomain.com

Each selector maps to a Microsoft-hosted target.

Add both CNAME records to your DNS provider. Do not modify the values. Copy and paste exactly as you see them. 

DNS propagation usually completes within 30 to 60 minutes, but allow more time if your provider is slow.

Once the records resolve correctly, return to the DKIM page and enable signing.

Phase 3: Enable DKIM Signing

After DNS is live:

  1. Go back to the DKIM settings page.
  2. Toggle DKIM to Enabled for the domain.
  3. Confirm the status shows signing is active.

Microsoft starts signing immediately once enabled. No restart or mail flow change is required.

Phase 4: Validate DKIM and SPF

Validation closes the loop. Send a test email from an Office 365 mailbox to: https://aboutmy.email

Check the results carefully. You should see: DKIM: PASS and SPF: PASS

If DKIM fails, DNS is almost always the cause.
If SPF fails, the issue sits elsewhere in your authentication stack.

Common DKIM Pitfalls in Microsoft 365

These issues come up often.

  • DKIM enabled before DNS propagation completes
  • Missing one of the two selector records
  • Publishing CNAMEs as TXT records
  • Forgetting to enable DKIM on secondary domains

Microsoft does not rotate keys automatically for every tenant.
Periodic reviews matter.

DKIM in Microsoft 365 is straightforward once you know where to look.
The challenge is remembering to turn it on at all.

Strong authentication protects your brand, supports DMARC, and improves long-term delivery outcomes. That work pays off quietly, every day.

Share the Post:

Related Posts

The Best Senders Read This – Do You?

Get expert-backed strategies, real-world case studies, and insider email deliverability tips straight to your inbox. Join the Inbox Insiders.