You added your domain to Office 365.
Everything looked good… until DKIM showed up.
No clear button.
Just DNS records and vague instructions.
Now you’re stuck, wondering: “Am I doing this right?”
This guide fixes that.
I’ll walk you through how to set up DKIM in Office 365 — in 5 simple steps.
No jargon. No guesswork. No IT degree needed.
Here’s what you’ll get:
Let’s make sure your emails hit inboxes, not spam.
Ready? Let’s go.
DKIM adds a digital signature to your emails to prove they came from your domain.
It’s not enabled by default in Office 365 — you need to set it up manually.
To set up DKIM in Office 365, follow 5 steps:
Use tools like Salesforge DKIM Checker, MXToolbox, or Google CheckMX to confirm it’s working.
To skip manual setup, Primeforge can do it for you.
Here’s the easiest way to understand it:
DKIM is like a digital signature for your emails.
It helps inboxes (like Gmail or Outlook) confirm that the email really came from you, and that it wasn’t changed or faked along the way.
When you use Office 365 to send emails, this signature isn’t turned on by default.
You have to set it up manually.
Once you set up DKIM in Office 365, Microsoft adds this signature to every email you send from your domain automatically.
Because without DKIM:
When you enable DKIM:
It also works together with other email security settings like SPF and DMARC — all of which help you send safe, authenticated emails.
Bottom line?
Setting up DKIM in Office 365 makes your email more secure, more reliable, and more professional.
And the best part — it only takes a few steps to turn it on.
Let’s get started.
Here’s how to set up DKIM in Office 365 in 5 quick and simple steps. You don’t need to be technical.
Let’s dive into detailed steps
To get started, go to the Microsoft 365 Defender portal:
🔗 https://security.microsoft.com
This is where Office 365 keeps all its email security settings, including DKIM.
Now let’s find the DKIM setup screen.
Choose the domain you want to enable DKIM for. If you have more than one domain, you’ll need to set up DKIM for each separately.
This is the key step.
Office 365 will show you two CNAME records. These records allow Microsoft to sign your emails on your behalf.
You need to copy those records and paste them into your domain’s DNS settings.
This usually means logging into your domain provider (like GoDaddy, Namecheap, Cloudflare, etc.).
Here’s what the format typically looks like:
📌 Tip: Be sure to copy everything exactly, no extra spaces or missing dots.
Once you’ve added the CNAME records, save the changes.
DNS updates can take a few minutes, but sometimes up to 24 hours.
After the DNS records are live, go back to the Microsoft 365 Defender portal.
Office 365 will now start digitally signing all outgoing emails from that domain using DKIM.
This step completes the DKIM setup in Office 365, and from now on, your emails will include a valid DKIM signature.
Once enabled, it’s a good idea to make sure everything’s working.
Use any of these free tools to check your DKIM:
Just send an email from your Office 365 domain, enter the domain name in the tool, and check the result.
You should see:
Once confirmed, you're done. DKIM is now active, and your domain is properly authenticated.
After you setup DKIM in Office 365, it’s a good idea to test if it’s actually working.
Here’s how you can confirm everything’s set up correctly.
This opens the raw email header. Look for a line that says:
DKIM=pass
If you see this, it means your domain is now signing emails correctly with DKIM.
If you don’t want to check email headers manually, you can use free online tools to test your DKIM setup.
Here are a few reliable options:
Salesforge DKIM checker is a free tool by Salesforge that checks whether your DKIM, SPF, and DMARC records are set up correctly — all in one place.
Why it’s great:
It’s fast, easy, and you don’t need to touch email headers or know your DKIM selector.
MXToolbox DKIM lookup helps you to check your domain’s DKIM records to see if they exist and are formatted correctly.
Why it’s great:
You can confirm if your CNAME records were added correctly after completing the Office 365 DKIM setup.
Google Admin Toolbox- Check MX is Google’s own tool to check whether your domain has proper email authentication configured, including DKIM, SPF, and DMARC.
Why it’s great:
If you send emails to Gmail users, this tool tells you if Google trusts your domain setup.
Setting up DKIM in Office 365 is a one-time task, but doing it right the first time makes all the difference. Here are some best practices to follow:
Avoid adding multiple conflicting records. Stick with the default selectors provided by Microsoft: selector1 and selector2.
Even a small typo in your CNAME record can break the setup. Make sure:
DNS changes don’t show up instantly. Give it at least 15 minutes to 24 hours before testing. If tools still can’t find your DKIM, wait a bit longer and test again.
Use tools like:
These tools help catch any setup issues early.
DKIM works best when combined with SPF and DMARC. Together, they create a strong email authentication framework and improve deliverability.
If you're sending from multiple domains in Office 365, you’ll need to setup DKIM separately for each one. Don’t assume one setup covers them all.
If you move your domain to a new DNS provider or make changes to Office 365, it’s a good idea to recheck that your DKIM setup is still working.
These small checks make sure your DKIM Office 365 setup process is solid, and saves you from future email delivery headaches.
Setting up DKIM in Office 365 is simple once you know the steps, but if you’re managing multiple domains, handling DNS changes, or just don’t want to risk errors, tools like PrimeForge can save you a lot of time.
PrimeForge helps you:
Whether you’re a solo founder or managing outreach at scale, PrimeForge helps keep your domain secure and email-ready, fast.
👉 If you want to make your DKIM setup easier and faster, check out PrimeForge.
Setting up DKIM in Office 365 isn’t as complicated as it sounds.
You just:
That’s it. Once it’s done, Office 365 takes care of the rest, signing your emails behind the scenes.
If you're managing multiple domains or just don’t want to mess with DNS every time, PrimeForge can help automate the setup.
It handles DKIM, SPF, and DMARC without the back-and-forth.
Q1. Is DKIM enabled by default in Office 365?
No, it’s not. You need to manually set it up for each domain connected to your Microsoft 365 account.
Q2. How long does it take for DKIM to work after setup?
It usually works within 15 minutes to a few hours.
Sometimes DNS changes can take up to 24 hours to fully update.
Q3. Do I need both DKIM and SPF?
Yes. DKIM and SPF work together to prove your emails are real.
It’s best to have both (plus DMARC) set up for full email protection.
Q4. What if the DKIM "Enable" button isn’t clickable?
That means Office 365 hasn’t detected your DNS records yet. Double-check the CNAME entries and give it a bit more time.
Tools like Salesforge DKIM Checker can help confirm if your records are live.
Q5. Can I use a tool to handle DKIM setup automatically?
Yes. If you don’t want to set up records manually or you're managing multiple domains, a tool like PrimeForge can handle DKIM, SPF, and DMARC setup for you — all in one place.
Q6. Do I have to repeat the setup for every domain in Office 365?
Yes. DKIM must be set up separately for each custom domain you use.