{"id":3025,"date":"2019-11-08T14:54:04","date_gmt":"2019-11-08T19:54:04","guid":{"rendered":"https:\/\/www.exchangedefender.com\/blog\/?p=3025"},"modified":"2019-11-11T11:04:16","modified_gmt":"2019-11-11T16:04:16","slug":"how-to-protect-yourself-from-domain-spoofing-and-phishing-with-exchangedefender","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2019\/11\/how-to-protect-yourself-from-domain-spoofing-and-phishing-with-exchangedefender\/","title":{"rendered":"How to Protect Yourself from Domain Spoofing and Phishing with ExchangeDefender"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/11\/Screen-Shot-2019-11-08-at-2.32.32-PM-1024x658.png\" alt=\"\" class=\"wp-image-3031\" width=\"808\" height=\"517\"\/><\/figure><\/div>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">At ExchangeDefender we want you to be safe online. One of the biggest and best steps you can take towards that goal is to both protect your domain from being \u201cspoofed\u201d (forged by a spammer) and to block any such forgeries from arriving into your mailbox.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">About Spoofing &nbsp;<\/h4>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">Spammers and hackers routinely abuse domains that do not have a SPF or DKIM record. They configure their email software to use <em>your domain name<\/em> for a SPAM campaign or to launch sophisticated phishing attacks. If you\u2019ve ever received an email from yourself, or from a forged government or corporate entity, you\u2019ve been a victim of spoofing. If you\u2019ve ever received thousands of rejections and delivery receipts for messages you never sent, you\u2019ve been a victim of spoofing. Because so many domain owners do not take responsibility for their DNS configuration, this is the most widely abused mechanism.<\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\"><strong>Good news is, ExchangeDefender can help protect you from these attacks and brand misuse through implementation of SPF, DKIM, and our corporate policies.&nbsp; &nbsp;<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">SPF (Sender Policy Framework)<\/h4>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">ExchangeDefender uses SPF to verify that the email is coming from a source that your organization trusts to send messages. This is typically your email server, our email server, and sometimes a business application (like a hosted CRM) that sends email using your domain name. All others get rejected as forgeries.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">How do you setup your SPF record? Simply go to wherever your domain name is hosted (your name server) and add this TXT field to your zone. You may need assistance from your ISP, domain registrar, or whoever is actually running your name servers. If you don\u2019t know who that is, or they are too difficult to use, ExchangeDefender will host your domain free of charge. The TXT record will not have a&nbsp; hostname and the value should be set to the following:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Hostname:&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Record type: TXT<\/strong><\/p>\n\n\n\n<p><strong>Value: v=spf1 include:proxy.exchangedefender.com -all<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">DKIM (Domain Keys)<\/h4>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">ExchangeDefender uses DKIM to validate automated digital signatures. We also sign messages for all customers that rely on ExchangeDefender to send outbound mail (pretty much everyone). This is a 2 step process similar to SPF.&nbsp;<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"color:#0965a4\" class=\"has-text-color\"><strong>Step 1: Request public key<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">Go to <a href=\"https:\/\/support.ownwebnow.com\">https:\/\/support.ownwebnow.com<\/a> and open a ticket requesting signatures of your outbound mail. Please specify which domains you wish to sign because each domain must have its own set of keys.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"color:#0965a4\" class=\"has-text-color\"><strong>Step 2: Create a DKIM public record<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">Go to wherever your DNS is hosted and just like in SPF, create a DKIM record:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Hostname: default._domainkey<\/strong><\/p>\n\n\n\n<p><strong>Record type: TXT<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Value: v=DKIM1; k=rsa; s=email;&nbsp; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0SXzBGHoJcBVKyNEntvTiMtoSIH4uiuY6i5hzF47<\/strong><br><strong>A2eYb4pB\/gtsHpP1vpDgzZvwVLz65nQwnm4wvSFsarKwCyWYyvGwPvBd9+v2Jcrk5dsfHioUDZo5oSvbRY<\/strong><br><strong>+e8AD7eo42A\/pYdgZxL9KRyZbMsCtHJrAqvYB6LZP0SFVvkYQIDAQAB<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p style=\"color:#0965a4\" class=\"has-text-color\"><em>Important<\/em>: This is just an example. You will need to use your own public key generated in Step 1 and provided by us. Also, the value of the TXT record has to be on the same line, if there are any line breaks (if you copy it from an email or web page) please remove them.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"color:#0965a4\" class=\"has-text-color\"><strong>Step 3: Update the ticket with us to test deployment<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">After the DNS record has been created for your domain, we will validate it and if configuration is valid we will start signing your outbound messages going through ExchangeDefender.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">After the DNS record has been created for your domain, we will validate it and if configuration is valid we will start signing your outbound messages going through ExchangeDefender.&nbsp;<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">ExchangeDefender Policy&nbsp;<\/h4>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">While we encourage all of our clients to implement both SPF and DKIM, we understand that there are sometimes business scenario cases under which this is impossible. If you find yourself in this predicament you should immediately change where your name servers are hosted and take full control of your organizations identity online. But if that is still something you may not be able to do, ExchangeDefender can still protect you from phishing attacks and spoofing launched using your own domain name. If you\u2019ve ever received email from yourself or from a colleague (but the email actually came from a server in Poland) then this setting will help you.<\/p>\n\n\n\n<p><strong>Go to <\/strong><a href=\"https:\/\/admin.exchangedefender.com\"><strong>https:\/\/admin.exchangedefender.com<\/strong><\/a><strong> and login as the domain administrator (username is your domain name).&nbsp;<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><a href=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/11\/TurnOff-Phishing-Protection.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/11\/TurnOff-Phishing-Protection-1024x629.png\" alt=\"\" class=\"wp-image-3057\" width=\"853\" height=\"522\"\/><\/a><\/figure><\/div>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">Click on <strong>Security Settings<\/strong> &gt; Phishing <br>Under \u201c<em>Flag External Emails<\/em>\u201d click on <strong>Enable<\/strong> and then <strong>Save<\/strong>.<\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">After this setting is applied, all messages from your domain that were sent from outside of the ExchangeDefender network will go into the SureSPAM quarantine. Just tell users not to trust, whitelist, or release messages that are coming from your own domain because they are certainly not legitimate.Note: This is the option of last resort and will not stop hackers or spammers from abusing your domain for phishing, spamming, or hacking. However, it will stop those messages from arriving directly into your users mailbox. If you already have a valid SPF record (with -all, not ~all) and DKIM in production, this setting is not necessary as ExchangeDefender will automatically reject messages that fail SPF\/DKIM validation.<\/p>\n\n\n\n<p class=\"has-text-color has-very-dark-gray-color\">If you have any questions or concerns about ExchangeDefender and implementation of SPF, DKIM, or phishing policies please feel free to contact us. <\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[88,169],"class_list":["post-3025","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-phishing","tag-spoofing"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=3025"}],"version-history":[{"count":30,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3025\/revisions"}],"predecessor-version":[{"id":3059,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3025\/revisions\/3059"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=3025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=3025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=3025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}