Security News > 2023 > October > Microsoft 365 email senders urged to implement SPF, DKIM and DMARC
In the wake of Google's announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods.
"These Domain Name Service email authentication records verify that you are the legitimate sender of your email and prevent spoofing and phishing attacks," Microsoft noted.
To make sure their emails are delivered and not rejected or marked as spam by email service providers such as Gmail, Yahoo, AOL, Outlook.com, Microsoft 365 email senders should authenticate their emails with SPF, DKIM and DMARC domain authentication tools.
Microsoft made sure to note, using Microsoft 365 to send bulk email is not a supported use of the service.
" has strict outbound spam controls that can block or segregate your email to a special high-risk delivery pool if it exceeds sending limits," the company explained.
"Following these recommendations does not guarantee delivery. If your email is rejected as bulk, send it through on-premises or a third-party provider instead," Microsoft concluded.
News URL
https://www.helpnetsecurity.com/2023/10/09/microsoft-365-bulk-email/
Related news
- Microsoft 365 Admin portal abused to send sextortion emails (source)
- A Hacker's Era: Why Microsoft 365 Protection Reigns Supreme (source)
- Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts (source)
- Microsoft fixes Outlook email sending issue for users with many folders (source)
- Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns (source)
- New Mamba 2FA bypass service targets Microsoft 365 accounts (source)
- Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks (source)
- Microsoft Outlook bug blocks email logins, causes app crashes (source)
- Microsoft Exchange adds warning to emails abusing spoofing flaw (source)
- ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps (source)