Trend Micro Email Security verifies DKIM signatures in incoming email messages and allows administrators to take actions on messages that fail to pass signature verification. If a message's DKIM signature passes verification, the message will continue to the next step in the regular delivery process.
The DKIM verification settings apply only to the selected recipient domain.
Trend Micro Email Security provides a built-in default rule that has the lowest priority to ensure you receive a baseline level of protection. The default rule cannot be deleted.
You can create only one single rule for each "Managed Domain". The default rule will be applied if no other rules are matched based on the "Managed Domain".
The Add DKIM Verification Settings screen appears.
X-Header is added to indicate whether DKIM verification is successful or not.
Here are some examples of X-Header:
X-TM-Authentication-Results:dkim=pass; No signatures and verification is not enforced
X-TM-Authentication-Results:dkim=pass; No processed signatures and verification is not enforced
X-TM-Authentication-Results:dkim=fail; No processed signatures but verification is enforced
X-TM-Authentication-Results:dkim=pass; Contain verified signature, header.d=test.com, header.s=TM-DKIM_201603291435, firstname.lastname@example.org
X-TM-Authentication-Results:dkim=fail; No verified signatures
Do not intercept messages
Delete entire message
Tags can be customized. When selecting the Tag subject action, note the following:
This action may destroy the existing DKIM signatures in email messages, leading to a DKIM verification failure by the downstream mail server.
To prevent tags from breaking digital signatures, select Do not tag digitally signed messages.
To add ignored peers to skip DKIM verification for specific sender domains, specify one or multiple sender domain names and click Add.
Trend Micro Email Security will not implement DKIM verification for email messages from the specific domain. The email messages will continue to the next step in the regular delivery process.
However, this does not mean the email messages have passed DKIM verification. They will fail subsequent DMARC authentication if they do not actually meet specific criteria of the DKIM standard.
To search for existing ignored peers, type a keyword and click Search.
To import ignored peers from a CSV file, click Import.
The following import options are available:
Merge: append the ignored peers to the existing list.
Overwrite: replace the existing list with the ignored peers in the file.
To add enforced peers to enforce DKIM verification for specific sender domains, specify one or multiple sender domain names and click Add.
Each email message from the specified domain must meet specific criteria of the DKIM standard; otherwise, an action will be taken on the message.
The following criteria must be met:
The sender domain must have a DKIM record.
There is at least one verified signature in the message.
To search for, import or export enforced peers, perform similar operations as described in the previous step.
If a sender domain is specified in both the ignored peer list and enforced peer list, Trend Micro Email Security skips DKIM verification for email messages from this domain.
All the settings you added take effect only when you click Add.