Back

Stopping Spoofing with DKIM and Exchange Online Protection

Stopping spoofing before it gets to your users becomes more important every day. Phishing is still the most common source of attacks, including malware, BEC scams, and ransomware. Providing defenses to stop spoofed and phishing emails t...

5 min read
Published on Jan 4, 2019
What is Microsoft Copilot

Stopping Spoofing

Stopping spoofing before it gets to your users becomes more important every day. Phishing is still the most common source of attacks, including malware, BEC scams, and ransomware. Providing defenses to stop spoofed and phishing emails from reaching your users is the best first line of defense. Thankfully, tools are available to help stop spoofing emails and handle phishing attempts. In this Tech Talk, Microsoft Security Architect Matt Soseman walks us through DKIM and demonstrates a number of email protection tools available in Microsoft Security Center.

The Threat of Spoofing and Phishing

  • $4.0 million dollars is the average cost of a data breach.
  • 81% of breaches involve weak or stolen passwords
  • More than 300,000 new malware samples are created and spread every day.
  • 87% of senior managers have admitted to accidentally leaking business data.

How does Microsoft protect its users against phishing?

When an email comes into your system, there are a series of 8 protections in place.

  • Sender authentication checks
  • Implicit intra-organization domain spoof detection
  • Anti-virus engine scan
  • URL reputation scan
  • Phish content analysis (Heuristic and rule based)
  • ATP (Advanced Threat Protection) machine learning models
  • ATP heuristic clustering and detonation
  • ATP Link content detonation

Once the email is delivered, four additional protections are in play

  • ATP Safe links time-of-click protection
  • Zero-hour auto purge
  • Safe links for office clients
  • Multi-factor authentication for Office 365

After running through delivery, there are 4 additional functions protecting user mailboxes

  • Client tips for suspicious emails
  • Tenant block URL for safe links
  • Monitor for risky user or app behavior
  • Search / remediate mails in threat explorer

What is DKIM (DomanKeys Identified Mail)

DomainKeys Identified Mail (DKIM) uses a public / private key pair to digitally “sign” elements of an email.

  1. When a new email is sent, the element (title, body, etc) is hashed to a unique text string.
  2. That hash is then encrypted using a private key
  3. The encrypted hash is added to the email as a digital signature.
  4. When the email arrives at the receiving server it sees this signature and run a DNS query to get the public key needed to decrypt the signature.
  5. The receiving server hashes the element and compares it to the decrypted hash in the signature
  6. If the two hashes match, then the receiving server knows the email:
    1. is really from the sending domain
    2. has not been tampered with during transit

The problematic part about DKIM is that it is not universally adopted, so the lack of a DKIM signature does not mean that an email is malicious or fraudulent. DKIM lets you know that that individual email is legitimate. Since the DKIM signature is not easily seen by the end user, it does not stop spoofing of the “header from:” domain, however it is a useful tool to stop spoofing emails that impersonate other employees at the same organization.

How to Enable DKIM in Microsoft Admin Center

DKIM is enabled by default in Office 365 with a single key. To get to your DKIM settings:

  • Go to “protection.microsoft.com
  • Click “Threat management” in the left hand menu
  • Click “Policy” in the drop down
  • Click DKIM in the main screen

Office 365 also automatically “rotates” your DKIM keys. DKIM key rotation is important, for the same reasons as changing passwords. The longer it remains the same, the more likely it is to be compromised. If, for some reason you require additional configuration for DKIM, microsoft has good guidance here.

Advanced Threat Protection Safe Attachments

Safe Attachments allows you to scan every attachment that comes into your environment, through Exchange, SharePoint, OneDrive and Teams. Instead of using obsolete hash/signature based detection methods that miss most self-mutating malware it actually opens or executes the attachment in a virtual sandbox and looks at the behavior of the file to determine if it is malicious. This detonation process easily defeats most methods of attack.

Configuring ATP Safe Attachments Policies

  • From protection.microsoft.com
  • Click “Threat management” in the left hand menu
  • Click “Policy” in the drop down
  • Click “ATP Safe Attachments” in the main screen menu
  • Click the ”+” icon on top of the policy list
  • Give the new policy a name and description
  • Select your desired response to detected malware:
    • Off - No Scanning
    • Monitor - Deliver after detection and track scan results
    • Block - Block the current malware and future emails and attachments with the same signature
    • Replace - Remove the malicious attachment, and continue to deliver the message
    • Dynamic Delivery - Deliver the message without attachments immediately, and reattach once scan is complete.
  • Configure redirect.
    • This is simply the ability to send all detected malware to a monitoring address
  • Select users, groups or domains that you want the policy to apply to.

We have done many deep dives into the various tools available to defend your users from Phishing and malware. For more guidance, check out the following Tech Talks and Blogs.

Anti-Phishing and Phishing Attack Simulator in Office 365

Stopping data loss with Azure Information Protection

Stopping, Blocking and Fixing Ransomware with Microsoft 365

AgileSecurity

If you are looking for professional guidance in securing your office 365 environment, we can help. Agile IT is a four-time Microsoft cloud partner of the year and has securely managed cloud transformation for over 1,000,000 accounts across nearly 2000 organizations. Our fixed priced services for security and managed services make budgeting easy and remove doubt. To find out more, contact us today.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Azure Migration vs AWS Migration Key Differences

Comparing Azure Migration and AWS Migration Key Differences in Cloud Strategy

Comparing Azure and AWS for cloud migration? Learn the key differences in pricing, security, tools, and performance to choose the right platform for your business.

Jun 18, 2025
8 min read
Benefits and Challenges of Azure Cloud Migration

Key Benefits and Challenges of Migrating to Microsoft Azure

Migrating to Microsoft Azure offers scalability and security, but it comes with challenges. Explore the key benefits and hurdles of Azure cloud migration.

Jun 17, 2025
10 min read
Who Needs to Comply with CMMC Regulations?

Who Needs to Follow DoD Cybersecurity Requirements for CMMC Compliance

CMMC regulations apply to defense contractors, subcontractors, and suppliers handling DoD information. Find out who must comply and what certification level is required.

Jun 17, 2025
6 min read
What’s the Real Cost of CMMC Compliance?

The Real Cost of CMMC: Catching Up on What You Were Already Supposed to Be Doing

CMMC isn’t introducing new rules, it’s enforcing what should already be in place. Learn what’s really driving the cost of CMMC compliance.

Jun 16, 2025
4 min read
How to Meet ITAR Compliance Requirements in Office 365

How to Meet ITAR Compliance Requirements in Office 365

Need to meet ITAR compliance in the Microsoft cloud? Learn why GCC High is required for Office 365, what the regulations demand, and how to secure export-controlled data.

Jun 12, 2025
6 min read
Are You Ready? Understanding CMMC Controls Prohibited from POA&Ms

Are You Ready? Understanding CMMC Controls Prohibited from POA&Ms

CMMC Level 2 requires full implementation of specific controls. Learn which ones cannot be deferred in a POA&M and how to prepare for assessment success.

Jun 11, 2025
7 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation