Implement DKIM
The monitoring tools described in Monitor Your Traffic will directly inform your work in this chapter; that is, you’ll use the monitoring results to identify third party senders for a domain and work to enable authentication methods (SPF and/or DKIM authentication) for those Senders.
Using DMARC Protection, the insight into your mail flow helps you to enable DKIM.