Contact Us

The Skysnag Blog

How to Set Up DKIM for Proofpoint Essentials?

October 11, 2023  |  2 min read
Proofpoint Essentials

DomainKeys Identified Mail (DKIM) is an email authentication system designed to detect email spoofing. It allows organizations to take responsibility for transmitting a message, while providing a mechanism to verify that the message was not altered during transit.  DKIM uses cryptographic signatures and public-key infrastructure to verify that an email message has not been altered during transit, and that it truly came from the claimed sender. Email senders can use DKIM to sign their messages by adding a DKIM-Signature header field to the messages. Email receivers can then use the public key published in the DNS to verify the signature and check that the message has not been tampered with. 

Steps to Configure DKIM for Proofpoint Essentials

Your domains can now be validated using DKIM thanks to Proofpoint. You should be able to examine your DKIM options on the domains page. It is available on all of their packages.

Use our free DKIM record generating tool to configure your DKIM keys right away if you don’t already have them set up. You must publish your public key on your DNS after obtaining your private and public key pair.

Keep in mind that you cannot manually import your DKIM keys; instead, you must speak with the domain administrator for Proofpoint to have them published on your DNS.

Use our free DKIM record lookup tool to validate the published DKIM record.

You can use Skysnag’s free DKIM Checker to check the health of your DKIM record here

Enable DMARC for your domains to protect against spoofing. Sign up for a free trial today!

For more information on Proofpoint Essentials DKIM setup, you can refer to their reference documentation

Check your domain’s DMARC security compliance

Enforce DMARC, SPF and DKIM in days - not months

Skysnag helps busy engineers enforce DMARC, responds to any misconfigurations for SPF or DKIM which increases email deliverability, and eliminates email spoofing and identity impersonation.