Security News > 2023 > October > Microsoft 365 email senders urged to implement SPF, DKIM and DMARC

In the wake of Google's announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods.
"These Domain Name Service email authentication records verify that you are the legitimate sender of your email and prevent spoofing and phishing attacks," Microsoft noted.
To make sure their emails are delivered and not rejected or marked as spam by email service providers such as Gmail, Yahoo, AOL, Outlook.com, Microsoft 365 email senders should authenticate their emails with SPF, DKIM and DMARC domain authentication tools.
Microsoft made sure to note, using Microsoft 365 to send bulk email is not a supported use of the service.
" has strict outbound spam controls that can block or segregate your email to a special high-risk delivery pool if it exceeds sending limits," the company explained.
"Following these recommendations does not guarantee delivery. If your email is rejected as bulk, send it through on-premises or a third-party provider instead," Microsoft concluded.
News URL
https://www.helpnetsecurity.com/2023/10/09/microsoft-365-bulk-email/
Related news
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware (source)
- Microsoft: Licensing issue blocks Microsoft 365 Family for some users (source)
- Tycoon2FA phishing kit targets Microsoft 365 with new tricks (source)
- ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK? (source)
- Microsoft blocks ActiveX by default in Microsoft 365, Office 2024 (source)
- Email authentication simplified: How PowerDMARC makes DMARC effortless (source)
- Attackers phish OAuth codes, take over Microsoft 365 accounts (source)
- Microsoft fixes machine learning bug flagging Adobe emails as spam (source)
- Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts (source)
- Microsoft fixes Exchange Online bug flagging Gmail emails as spam (source)