Configure DKIM verification

If an inbound message fails DKIMClosed DomainKeys Identified Mail checks, you can select to hold it in a specified message area, or reject it. You can specify different actions, depending on whether a hard failure or soft failure occurs.

Enable or disable DKIM Hard Fail checking

  1. Navigate to Policy > Manage Policy Definition > SpamLogic Settings. The SpamLogic Settings page is displayed.

  2. Select the Spam Policy tab.

  3. In the Spam Policy panel, click Click here to change these settings.

  4. From the drop-down menu of DKIM Hard Fail, select:

    • Disabled

    • Hold in area: This is the default option.

    • Reject

    • Add Info & Deliver

    • Hold, Add Info & Deliver

     
    • As DKIM TXT records are often incorrectly configured in the DNS, we recommend that you initially hold any DKIM Hard Fail messages and review them, rather than immediately rejecting them.

    • If you select an option that contains Hold, a message will be held in a message area specified in the Hold Junk Email in Message Area panel on the SpamLogic Settings page.

  5. Click Save.

Enable or disable DKIM Soft Fail checking

  1. Navigate to Policy > Manage Policy Definition > SpamLogic Settings. The SpamLogic Settings page is displayed.

  2. Select the Spam Policy tab.

  3. In the Spam Policy panel, click Click here to change these settings.

  4. From the drop-down menu of DKIM Soft Fail, select:

    • Disabled: This is the default option.

    • Hold in area

    • Add Info & Deliver

    • Hold, Add Info & Deliver

      If you select an option that contains Hold, a message will be held in a message area specified in the Hold Junk Email in Message Area panel on the SpamLogic Settings page.
  5. Click Save.

 

If you change any configuration or policy settings, you must Apply Configuration for the new settings to take effect. You can do this either from the Changes Made panel, or System > ConfigurationApply Configuration. See Apply new configuration for more information.

If you use Peer Gateways (i.e. when multiple Gateways are peered), any configuration changes from a local Gateway can then be applied to all the peers at the same time. See Configure Peer Gateways for more information.

See also...