{"id":15236,"date":"2026-02-02T14:44:31","date_gmt":"2026-02-02T11:44:31","guid":{"rendered":"https:\/\/www.ihs.com.tr\/blog\/?p=15236"},"modified":"2026-02-02T14:44:31","modified_gmt":"2026-02-02T11:44:31","slug":"e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/","title":{"rendered":"E-posta \u0130letimini \u0130yile\u015ftiren DNS Kay\u0131tlar\u0131: SPF, DKIM ve DMARC Detayl\u0131 Rehber"},"content":{"rendered":"<p>Dijital ileti\u015fimin temel ta\u015f\u0131 olan e-posta, i\u015fletmeler i\u00e7in hayati bir ara\u00e7 olmaya devam ediyor. Ancak bu vazge\u00e7ilmezlik, onu siber sald\u0131rganlar i\u00e7in de bir numaral\u0131 hedef haline getiriyor. E-posta sahtekarl\u0131\u011f\u0131, kimlik av\u0131 sald\u0131r\u0131lar\u0131 ve spam gibi tehditler, hem marka itibar\u0131n\u0131 zedeliyor hem de ciddi finansal kay\u0131plara yol a\u00e7abiliyor. \u0130\u015fte bu noktada, e-posta altyap\u0131s\u0131n\u0131n g\u00fcvenli\u011fini ve iletilebilirli\u011fini sa\u011flamak i\u00e7in tasarlanm\u0131\u015f \u00fc\u00e7 temel DNS kayd\u0131 devreye giriyor: SPF, DKIM ve DMARC. Bu \u00fc\u00e7l\u00fc, bir e-postan\u0131n ger\u00e7ekten iddia etti\u011fi yerden gelip gelmedi\u011fini do\u011frulayarak ve bu s\u00fcre\u00e7te herhangi bir de\u011fi\u015fikli\u011fe u\u011framad\u0131\u011f\u0131ndan emin olarak dijital ileti\u015fimlerinizi koruma alt\u0131na al\u0131r. Bu kapsaml\u0131 rehberde, bu \u00fc\u00e7 kritik DNS kayd\u0131n\u0131n ne oldu\u011funu, nas\u0131l \u00e7al\u0131\u015ft\u0131klar\u0131n\u0131 ve e-posta g\u00fcvenli\u011finizi en \u00fcst d\u00fczeye \u00e7\u0131karmak i\u00e7in nas\u0131l birlikte yap\u0131land\u0131r\u0131lmalar\u0131 gerekti\u011fini ad\u0131m ad\u0131m inceleyece\u011fiz.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7erik Tablosu<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69f8ff0d2186b\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\" id=\"ez-toc-cssicon-toggle-item-69f8ff0d2186b\" aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Guvenliginin-Temelleri-ve-Yaygin-Tehditler\" >E-posta G\u00fcvenli\u011finin Temelleri ve Yayg\u0131n Tehditler<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Iletim-Protokolu-SMTP-ve-Guvenlik-Aciklari\" >E-posta \u0130letim Protokol\u00fc (SMTP) ve G\u00fcvenlik A\u00e7\u0131klar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Sahtekarligi-Spoofing-Nedir-ve-Nasil-Yapilir\" >E-posta Sahtekarl\u0131\u011f\u0131 (Spoofing) Nedir ve Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Kimlik-Avi-Phishing-Saldirilari-ve-Isletmeler-Uzerindeki-Etkileri\" >Kimlik Av\u0131 (Phishing) Sald\u0131r\u0131lar\u0131 ve \u0130\u015fletmeler \u00dczerindeki Etkileri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Iletilebilirligi-Deliverability-ve-Spam-Filtreleri\" >E-posta \u0130letilebilirli\u011fi (Deliverability) ve Spam Filtreleri<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Sender-Policy-Framework-Kaydi\" >SPF (Sender Policy Framework) Kayd\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Nedir\" >SPF Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Kaydinin-Calisma-Prensibi\" >SPF Kayd\u0131n\u0131n \u00c7al\u0131\u015fma Prensibi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Kaydi-Sozdizimi-ve-Bilesenleri\" >SPF Kayd\u0131 S\u00f6zdizimi ve Bile\u015fenleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Kaydi-Olusturma-ve-DNSe-Ekleme-Adimlari\" >SPF Kayd\u0131 Olu\u015fturma ve DNS&#8217;e Ekleme Ad\u0131mlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-Kaydinin-Sinirlari-ve-Yetersiz-Kaldigi-Durumlar\" >SPF Kayd\u0131n\u0131n S\u0131n\u0131rlar\u0131 ve Yetersiz Kald\u0131\u011f\u0131 Durumlar<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIM-DomainKeys-Identified-Mail-Kaydi\" >DKIM (DomainKeys Identified Mail) Kayd\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIM-Nedir\" >DKIM Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIMin-Calisma-Mantigi-Kriptografik-Imza-Sureci\" >DKIM&#8217;in \u00c7al\u0131\u015fma Mant\u0131\u011f\u0131: Kriptografik \u0130mza S\u00fcreci<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIM-Kaydi-Sozdizimi-ve-Onemli-Etiketler-v-k-p-s\" >DKIM Kayd\u0131 S\u00f6zdizimi ve \u00d6nemli Etiketler (v, k, p, s)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIM-Secici-Selector-Kavrami-ve-Onemi\" >DKIM Se\u00e7ici (Selector) Kavram\u0131 ve \u00d6nemi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DKIM-Kaydi-Olusturma-ve-DNSe-Ekleme-Adimlari\" >DKIM Kayd\u0131 Olu\u015fturma ve DNS&#8217;e Ekleme Ad\u0131mlar\u0131<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Domain-based-Message-Authentication-Reporting-and-Conformance-Kaydi\" >DMARC (Domain-based Message Authentication, Reporting, and Conformance) Kayd\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Nedir\" >DMARC Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARCin-SPF-ve-DKIM-Uzerindeki-Rolu\" >DMARC&#8217;\u0131n SPF ve DKIM \u00dczerindeki Rol\u00fc<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Hizalama-Alignment-Kavrami\" >DMARC Hizalama (Alignment) Kavram\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Politikalari-Alici-Sunucuya-Talimat-Verme\" >DMARC Politikalar\u0131: Al\u0131c\u0131 Sunucuya Talimat Verme<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Kaydi-Sozdizimi-ve-Etiketleri-v-p-rua-ruf-pct-sp\" >DMARC Kayd\u0131 S\u00f6zdizimi ve Etiketleri (v, p, rua, ruf, pct, sp)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARC-Raporlamasinin-Onemi-Toplu-Aggregate-ve-Adli-Forensic-Raporlar\" >DMARC Raporlamas\u0131n\u0131n \u00d6nemi: Toplu (Aggregate) ve Adli (Forensic) Raporlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#DMARCi-Asamali-Olarak-Uygulama-Stratejisi\" >DMARC&#8217;\u0131 A\u015famal\u0131 Olarak Uygulama Stratejisi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-DKIM-ve-DMARCin-Birlikte-Calismasi\" >SPF, DKIM ve DMARC&#8217;\u0131n Birlikte \u00c7al\u0131\u015fmas\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Dogrulama-Zincirinin-Tamamlanmasi\" >E-posta Do\u011frulama Zincirinin Tamamlanmas\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Bir-E-postanin-Yolculugu-Adim-Adim-Dogrulama-Senaryosu\" >Bir E-postan\u0131n Yolculu\u011fu: Ad\u0131m Ad\u0131m Do\u011frulama Senaryosu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Bu-Uc-Kaydin-E-posta-Itibarini-Sender-Reputation-Nasil-Guclendirdigi\" >Bu \u00dc\u00e7 Kayd\u0131n E-posta \u0130tibar\u0131n\u0131 (Sender Reputation) Nas\u0131l G\u00fc\u00e7lendirdi\u011fi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#BIMI-Brand-Indicators-for-Message-Identification-ile-Iliskisi\" >BIMI (Brand Indicators for Message Identification) ile \u0130li\u015fkisi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Uygulama-Test-ve-Sorun-Giderme\" >Uygulama, Test ve Sorun Giderme<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#SPF-DKIM-ve-DMARC-Kayitlarini-Dogrulama-Araclari\" >SPF, DKIM ve DMARC Kay\u0131tlar\u0131n\u0131 Do\u011frulama Ara\u00e7lar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Sik-Karsilasilan-Yapilandirma-Hatalari\" >S\u0131k Kar\u015f\u0131la\u015f\u0131lan Yap\u0131land\u0131rma Hatalar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Ucuncu-Taraf-E-posta-Servisleri-Google-Workspace-Microsoft-365-vb-icin-Yapilandirma\" >\u00dc\u00e7\u00fcnc\u00fc Taraf E-posta Servisleri (Google Workspace, Microsoft 365 vb.) i\u00e7in Yap\u0131land\u0131rma<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Guvenligi-ve-DNS-Yonetimi-Icin-Neden-IHS-Telekomu-Tercih-Etmelisiniz\" >E-posta G\u00fcvenli\u011fi ve DNS Y\u00f6netimi \u0130\u00e7in Neden \u0130HS Telekom&#8217;u Tercih Etmelisiniz?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Uzman-Teknik-Destek-ve-Danismanlik-Hizmetleri\" >Uzman Teknik Destek ve Dan\u0131\u015fmanl\u0131k Hizmetleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Kullanici-Dostu-ve-Gelismis-DNS-Yonetim-Paneli\" >Kullan\u0131c\u0131 Dostu ve Geli\u015fmi\u015f DNS Y\u00f6netim Paneli<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#Yuksek-Performansli-ve-Guvenilir-DNS-Altyapisi\" >Y\u00fcksek Performansl\u0131 ve G\u00fcvenilir DNS Altyap\u0131s\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/www.ihs.com.tr\/blog\/e-posta-iletimini-iyilestiren-dns-kayitlari-spf-dkim-ve-dmarc-detayli-rehber\/#E-posta-Guvenliginizi-Tamamlayan-Diger-Hizmetler-SSL-Guvenlik-Duvari-vb\" >E-posta G\u00fcvenli\u011finizi Tamamlayan Di\u011fer Hizmetler (SSL, G\u00fcvenlik Duvar\u0131 vb.)<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"E-posta-Guvenliginin-Temelleri-ve-Yaygin-Tehditler\"><\/span>E-posta G\u00fcvenli\u011finin Temelleri ve Yayg\u0131n Tehditler<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern i\u015f d\u00fcnyas\u0131n\u0131n vazge\u00e7ilmezi olan e-posta, ne yaz\u0131k ki do\u011fas\u0131 gere\u011fi baz\u0131 g\u00fcvenlik riskleri bar\u0131nd\u0131r\u0131r. Bu riskleri anlamak, onlara kar\u015f\u0131 etkili bir savunma mekanizmas\u0131 kurman\u0131n ilk ad\u0131m\u0131d\u0131r. E-posta altyap\u0131s\u0131n\u0131n temel protokollerindeki zay\u0131fl\u0131klar, siber sald\u0131rganlar\u0131n markan\u0131z\u0131 taklit ederek doland\u0131r\u0131c\u0131l\u0131k yapmas\u0131na olanak tan\u0131r. Bu durum, hem finansal kay\u0131plara hem de m\u00fc\u015fteri g\u00fcveninin sars\u0131lmas\u0131na neden olabilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"E-posta-Iletim-Protokolu-SMTP-ve-Guvenlik-Aciklari\"><\/span>E-posta \u0130letim Protokol\u00fc (SMTP) ve G\u00fcvenlik A\u00e7\u0131klar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta g\u00f6nderiminin arkas\u0131ndaki temel teknoloji olan Basit Posta Aktar\u0131m Protokol\u00fc (Simple Mail Transfer Protocol &#8211; SMTP), ilk tasarland\u0131\u011f\u0131nda g\u00fcvenlik \u00f6ncelikli bir protokol de\u011fildi. Temel amac\u0131, mesajlar\u0131 bir sunucudan di\u011ferine basit ve h\u0131zl\u0131 bir \u015fekilde iletmekti. Bu tasar\u0131m, do\u011fas\u0131 gere\u011fi g\u00f6nderici kimli\u011finin do\u011frulanmas\u0131n\u0131 zorunlu k\u0131lmaz. Yani bir sald\u0131rgan, teknik olarak herhangi birinin e-posta adresini &#8220;G\u00f6nderen&#8221; olarak belirterek e-posta g\u00f6nderebilir. Bu temel g\u00fcvenlik a\u00e7\u0131\u011f\u0131, e-posta sahtekarl\u0131\u011f\u0131 (spoofing) ve kimlik av\u0131 (phishing) gibi sald\u0131r\u0131lar\u0131n ana sebebidir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"E-posta-Sahtekarligi-Spoofing-Nedir-ve-Nasil-Yapilir\"><\/span>E-posta Sahtekarl\u0131\u011f\u0131 (Spoofing) Nedir ve Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta sahtekarl\u0131\u011f\u0131 (spoofing), bir sald\u0131rgan\u0131n &#8220;G\u00f6nderen&#8221; adresini (From address) de\u011fi\u015ftirerek e-postay\u0131 ba\u015fka bir ki\u015fi veya kurumdan geliyormu\u015f gibi g\u00f6stermesi eylemidir. \u00d6rne\u011fin, bir sald\u0131rgan \u015firketinizin CEO&#8217;sunun e-posta adresini taklit ederek finans departman\u0131na sahte bir fatura \u00f6deme talimat\u0131 g\u00f6nderebilir. Al\u0131c\u0131 taraf\u0131nda e-posta, ger\u00e7ekten CEO&#8217;dan geliyormu\u015f gibi g\u00f6r\u00fcnece\u011fi i\u00e7in bu t\u00fcr sald\u0131r\u0131lar\u0131n ba\u015far\u0131 oran\u0131 olduk\u00e7a y\u00fcksektir. SMTP&#8217;nin yerle\u015fik bir kimlik do\u011frulama mekanizmas\u0131na sahip olmamas\u0131, bu t\u00fcr sahtekarl\u0131klar\u0131 teknik olarak m\u00fcmk\u00fcn k\u0131lar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Kimlik-Avi-Phishing-Saldirilari-ve-Isletmeler-Uzerindeki-Etkileri\"><\/span>Kimlik Av\u0131 (Phishing) Sald\u0131r\u0131lar\u0131 ve \u0130\u015fletmeler \u00dczerindeki Etkileri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Kimlik av\u0131 ya da <a href=\"https:\/\/www.ihs.com.tr\/blog\/phishing-e-posta-nedir-nasil-anlasilir\/\">Phishing<\/a>, genellikle e-posta sahtekarl\u0131\u011f\u0131 kullan\u0131larak ger\u00e7ekle\u015ftirilen bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Sald\u0131rganlar, kurbanlar\u0131 me\u015fru bir kurumdan (banka, sosyal medya platformu, e-ticaret sitesi vb.) geliyormu\u015f gibi g\u00f6r\u00fcnen sahte e-postalarla kand\u0131rarak hassas bilgilerini (kullan\u0131c\u0131 adlar\u0131, \u015fifreler, kredi kart\u0131 bilgileri) \u00e7almay\u0131 hedefler. \u0130\u015fletmeler i\u00e7in kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n etkileri y\u0131k\u0131c\u0131 olabilir: Veri ihlalleri, finansal doland\u0131r\u0131c\u0131l\u0131k, marka itibar\u0131n\u0131n zedelenmesi ve m\u00fc\u015fteri kayb\u0131 bu etkilerden sadece birka\u00e7\u0131d\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"E-posta-Iletilebilirligi-Deliverability-ve-Spam-Filtreleri\"><\/span>E-posta \u0130letilebilirli\u011fi (Deliverability) ve Spam Filtreleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta g\u00fcvenli\u011finin bir di\u011fer \u00f6nemli y\u00f6n\u00fc de iletilebilirliktir (deliverability). G\u00f6nderdi\u011finiz e-postalar\u0131n al\u0131c\u0131lar\u0131n gelen kutusuna sorunsuz bir \u015fekilde ula\u015fmas\u0131 gerekir. Ancak, artan siber tehditler nedeniyle e-posta servis sa\u011flay\u0131c\u0131lar\u0131 (Gmail, Outlook vb.) <a href=\"https:\/\/www.ihs.com.tr\/blog\/spam-filtreleri-nasil-calisir\/\">spam<\/a> filtrelerini s\u00fcrekli olarak geli\u015ftirmektedir. Bu filtreler, bir e-postan\u0131n me\u015fru olup olmad\u0131\u011f\u0131n\u0131 anlamak i\u00e7in g\u00f6nderen sunucunun IP adresi, g\u00f6nderici alan ad\u0131n\u0131n itibar\u0131 ve e-postan\u0131n kimli\u011finin do\u011frulan\u0131p do\u011frulanmad\u0131\u011f\u0131 gibi bir\u00e7ok sinyali analiz eder. SPF, DKIM ve DMARC gibi do\u011frulama mekanizmalar\u0131n\u0131n eksikli\u011fi, me\u015fru e-postalar\u0131n\u0131z\u0131n bile spam olarak i\u015faretlenmesine veya hi\u00e7 teslim edilmemesine neden olabilir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SPF-Sender-Policy-Framework-Kaydi\"><\/span>SPF (Sender Policy Framework) Kayd\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>E-posta sahtekarl\u0131\u011f\u0131na kar\u015f\u0131 ilk savunma hatt\u0131 olan SPF, alan ad\u0131n\u0131z ad\u0131na hangi sunucular\u0131n e-posta g\u00f6ndermeye yetkili oldu\u011funu beyan etmenizi sa\u011flayan bir e-posta kimlik do\u011frulama standard\u0131d\u0131r. Bu basit ama etkili mekanizma, alan ad\u0131n\u0131z\u0131n yetkisiz kullan\u0131m\u0131n\u0131 \u00f6nleyerek siber sald\u0131rganlar\u0131n markan\u0131z\u0131 taklit etmesini zorla\u015ft\u0131r\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SPF-Nedir\"><\/span>SPF Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Sender Policy Framework (SPF), bir alan ad\u0131 sahibi taraf\u0131ndan <a href=\"https:\/\/www.ihs.com.tr\/blog\/dns-kaydi-nedir-dns-kayit-turleri-nelerdir\/\">DNS<\/a> kay\u0131tlar\u0131na eklenen bir TXT kayd\u0131d\u0131r. Bu kay\u0131t, o alan ad\u0131 i\u00e7in hangi posta sunucular\u0131n\u0131n veya IP adreslerinin e-posta g\u00f6nderme iznine sahip oldu\u011funu listeler. Al\u0131c\u0131 bir e-posta sunucusu, alan ad\u0131n\u0131zdan bir e-posta ald\u0131\u011f\u0131nda, g\u00f6nderen sunucunun IP adresinin sizin SPF kayd\u0131n\u0131zda listelenip listelenmedi\u011fini kontrol eder. E\u011fer IP adresi listede yoksa, e-postan\u0131n sahte olma ihtimali y\u00fckselir ve al\u0131c\u0131 sunucu bu e-postay\u0131 \u015f\u00fcpheli olarak i\u015faretleyebilir, spam klas\u00f6r\u00fcne ta\u015f\u0131yabilir veya tamamen reddedebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SPF-Kaydinin-Calisma-Prensibi\"><\/span>SPF Kayd\u0131n\u0131n \u00c7al\u0131\u015fma Prensibi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SPF&#8217;nin \u00e7al\u0131\u015fma s\u00fcreci olduk\u00e7a basittir ve birka\u00e7 ad\u0131mdan olu\u015fur:<\/p>\n<ol>\n<li><b>Yay\u0131nlama:<\/b> Alan ad\u0131 sahibi (\u00f6rne\u011fin, `sirketim.com`), kendi DNS ayarlar\u0131na hangi IP adreslerinin `sirketim.com` ad\u0131na e-posta g\u00f6nderebilece\u011fini belirten bir SPF (TXT) kayd\u0131 ekler.<\/li>\n<li><b>G\u00f6nderim:<\/b> Bir sunucu, `kullanici@sirketim.com` adresinden bir e-posta g\u00f6nderir.<\/li>\n<li><b>Al\u0131m ve Kontrol:<\/b> Al\u0131c\u0131 e-posta sunucusu, e-postay\u0131 ald\u0131\u011f\u0131nda g\u00f6nderen alan ad\u0131n\u0131n (`sirketim.com`) DNS kay\u0131tlar\u0131n\u0131 sorgular.<\/li>\n<li><b>Do\u011frulama:<\/b> Al\u0131c\u0131 sunucu, `sirketim.com` i\u00e7in yay\u0131nlanm\u0131\u015f olan SPF kayd\u0131n\u0131 bulur ve e-postay\u0131 g\u00f6nderen sunucunun IP adresinin bu kay\u0131ttaki yetkili IP listesinde olup olmad\u0131\u011f\u0131n\u0131 kontrol eder.<\/li>\n<li><b>Sonu\u00e7:<\/b> E\u011fer IP adresi yetkili listede ise, SPF kontrol\u00fc ba\u015far\u0131l\u0131 olur (Pass). E\u011fer listede de\u011filse, kontrol ba\u015far\u0131s\u0131z olur (Fail) ve al\u0131c\u0131 sunucu, DMARC politikan\u0131za g\u00f6re e-postay\u0131 ne yapaca\u011f\u0131na karar verir.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"SPF-Kaydi-Sozdizimi-ve-Bilesenleri\"><\/span>SPF Kayd\u0131 S\u00f6zdizimi ve Bile\u015fenleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bir SPF kayd\u0131, belirli bile\u015fenlerden ve mekanizmalardan olu\u015fan bir metin dizesidir. Her zaman `v=spf1` ile ba\u015flar ve genellikle `all` mekanizmas\u0131 ile sona erer.<\/p>\n<h4>v=spf1 S\u00fcr\u00fcm Belirteci<\/h4>\n<p>Bu, kayd\u0131n bir SPF kayd\u0131 oldu\u011funu ve s\u00fcr\u00fcm 1&#8217;i kulland\u0131\u011f\u0131n\u0131 belirtir. \u015eu anda standart olan ve kullan\u0131lan tek s\u00fcr\u00fcm budur.<\/p>\n<h4>Mekanizmalar (a, mx, ip4, ip6, include, all)<\/h4>\n<p>Mekanizmalar, hangi sunucular\u0131n e-posta g\u00f6ndermeye yetkili oldu\u011funu tan\u0131mlar. En yayg\u0131n kullan\u0131lan mekanizmalar \u015funlard\u0131r:<\/p>\n<ul>\n<li><b>a:<\/b> Alan ad\u0131n\u0131n A kayd\u0131nda bulunan IP adresinin e-posta g\u00f6ndermesine izin verir.<\/li>\n<li><b>mx:<\/b> Alan ad\u0131n\u0131n MX kay\u0131tlar\u0131nda tan\u0131ml\u0131 olan posta sunucular\u0131n\u0131n e-posta g\u00f6ndermesine izin verir.<\/li>\n<li><b>ip4:<\/b> Belirli bir IPv4 adresinin veya adres aral\u0131\u011f\u0131n\u0131n e-posta g\u00f6ndermesine izin verir. \u00d6rnek: `ip4:192.168.1.1`<\/li>\n<li><b>ip6:<\/b> Belirli bir IPv6 adresinin e-posta g\u00f6ndermesine izin verir.<\/li>\n<li><b>include:<\/b> Ba\u015fka bir alan ad\u0131n\u0131n SPF kayd\u0131n\u0131 kontrol etmeyi ve o kayd\u0131n kurallar\u0131n\u0131 dahil etmeyi sa\u011flar. Bu, Google Workspace veya Microsoft 365 gibi \u00fc\u00e7\u00fcnc\u00fc taraf e-posta servislerini yetkilendirmek i\u00e7in s\u0131k\u00e7a kullan\u0131l\u0131r. \u00d6rnek: `include:_spf.google.com`<\/li>\n<li><b>all:<\/b> Di\u011fer t\u00fcm mekanizmalarla e\u015fle\u015fmeyen t\u00fcm kaynaklar\u0131 ifade eder. Genellikle kayd\u0131n en sonunda yer al\u0131r ve bir niteleyici ile birlikte kullan\u0131l\u0131r.<\/li>\n<\/ul>\n<h4>Niteleyiciler (+, -, ~, ?)<\/h4>\n<p>Niteleyiciler, bir mekanizma e\u015fle\u015fti\u011finde al\u0131c\u0131 sunucuya ne yapmas\u0131 gerekti\u011fini bildiren \u00f6n eklerdir.<\/p>\n<div class=\"karsilastirma\">\n<table>\n<thead>\n<tr>\n<th>Niteleyici<\/th>\n<th>Anlam\u0131<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><b>+<\/b> (Pass)<\/td>\n<td>Ge\u00e7ti<\/td>\n<td>IP adresinin e-posta g\u00f6nderme izni var. Bu varsay\u0131lan niteleyicidir, bu nedenle genellikle belirtilmez (<code>mx<\/code> ile <code>+mx<\/code> ayn\u0131 anlama gelir).<\/td>\n<\/tr>\n<tr>\n<td><b>&#8211;<\/b> (Fail)<\/td>\n<td>Ba\u015far\u0131s\u0131z<\/td>\n<td>IP adresinin e-posta g\u00f6nderme izni yok. E-postan\u0131n reddedilmesi \u00f6nerilir. Genellikle <code>-all<\/code> \u015feklinde kullan\u0131l\u0131r.<\/td>\n<\/tr>\n<tr>\n<td><b>~<\/b> (SoftFail)<\/td>\n<td>\u015e\u00fcpheli<\/td>\n<td>IP adresinin muhtemelen e-posta g\u00f6nderme izni yok. E-postan\u0131n kabul edilmesi ancak \u015f\u00fcpheli olarak i\u015faretlenmesi (\u00f6rne\u011fin, spam klas\u00f6r\u00fcne ta\u015f\u0131nmas\u0131) \u00f6nerilir. Genellikle <code>~all<\/code> \u015feklinde kullan\u0131l\u0131r.<\/td>\n<\/tr>\n<tr>\n<td><b>?<\/b> (Neutral)<\/td>\n<td>N\u00f6tr<\/td>\n<td>SPF kayd\u0131, IP adresinin yetkili olup olmad\u0131\u011f\u0131 hakk\u0131nda bir \u015fey belirtmiyor. E-posta, sanki SPF kayd\u0131 yokmu\u015f gibi de\u011ferlendirilir.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"SPF-Kaydi-Olusturma-ve-DNSe-Ekleme-Adimlari\"><\/span>SPF Kayd\u0131 Olu\u015fturma ve DNS&#8217;e Ekleme Ad\u0131mlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li><b>Yetkili Kaynaklar\u0131 Belirleyin:<\/b> Alan ad\u0131n\u0131z ad\u0131na e-posta g\u00f6nderen t\u00fcm sunucular\u0131n ve hizmetlerin (web sunucunuz, ofis posta sunucunuz, Google Workspace, Mailchimp gibi pazarlama ara\u00e7lar\u0131) IP adreslerini veya alan adlar\u0131n\u0131 listeleyin.<\/li>\n<li><b>SPF Kayd\u0131n\u0131 Olu\u015fturun:<\/b> `v=spf1` ile ba\u015flayarak, belirledi\u011finiz kaynaklar\u0131 `ip4`, `a`, `mx`, ve `include` mekanizmalar\u0131yla ekleyin. \u00d6rne\u011fin: `v=spf1 mx include:_spf.google.com ip4:123.45.67.89 ~all`<\/li>\n<li><b>Politikan\u0131z\u0131 Se\u00e7in:<\/b> Kayd\u0131n sonuna, e\u015fle\u015fmeyen t\u00fcm kaynaklar i\u00e7in ne yap\u0131laca\u011f\u0131n\u0131 belirten bir `all` mekanizmas\u0131 ekleyin. Genellikle ge\u00e7i\u015f d\u00f6neminde `~all` (SoftFail), tam olarak yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131nda ise `-all` (Fail) kullan\u0131l\u0131r.<\/li>\n<li><b>DNS&#8217;e Ekleyin:<\/b> DNS y\u00f6netim panelinize gidin. Alan ad\u0131n\u0131z i\u00e7in yeni bir TXT kayd\u0131 olu\u015fturun. &#8220;Host&#8221; veya &#8220;Name&#8221; alan\u0131na genellikle `@` (ana alan ad\u0131n\u0131 temsil eder) yaz\u0131n ve &#8220;Value&#8221; veya &#8220;De\u011fer&#8221; alan\u0131na olu\u015fturdu\u011funuz SPF dizesini yap\u0131\u015ft\u0131r\u0131n.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"SPF-Kaydinin-Sinirlari-ve-Yetersiz-Kaldigi-Durumlar\"><\/span>SPF Kayd\u0131n\u0131n S\u0131n\u0131rlar\u0131 ve Yetersiz Kald\u0131\u011f\u0131 Durumlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SPF g\u00fc\u00e7l\u00fc bir ara\u00e7 olmas\u0131na ra\u011fmen baz\u0131 s\u0131n\u0131rlamalara sahiptir. En bilinen sorunu, e-posta y\u00f6nlendirmelerinde (forwarding) ya\u015fan\u0131r. Bir e-posta y\u00f6nlendirildi\u011finde, orijinal g\u00f6nderici bilgisi korunur ancak e-postay\u0131 ileten sunucunun IP adresi, orijinal alan ad\u0131n\u0131n SPF kayd\u0131nda yer almaz. Bu durum, me\u015fru y\u00f6nlendirilmi\u015f e-postalar\u0131n SPF kontrol\u00fcnden ge\u00e7ememesine neden olabilir. Ayr\u0131ca, bir SPF kayd\u0131nda en fazla 10 DNS sorgusu (lookup) limiti vard\u0131r. \u00c7ok say\u0131da `include` mekanizmas\u0131 kullanmak bu limiti a\u015fman\u0131za ve SPF&#8217;in hatal\u0131 \u00e7al\u0131\u015fmas\u0131na neden olabilir. Son olarak, SPF yaln\u0131zca g\u00f6nderen sunucunun IP adresini do\u011frular, e-postan\u0131n i\u00e7eri\u011finin veya &#8220;G\u00f6nderen&#8221; ba\u015fl\u0131\u011f\u0131n\u0131n de\u011fi\u015ftirilip de\u011fi\u015ftirilmedi\u011fini kontrol etmez. Bu eksiklikler, DKIM ve DMARC ile giderilir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DKIM-DomainKeys-Identified-Mail-Kaydi\"><\/span>DKIM (DomainKeys Identified Mail) Kayd\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SPF, bir e-postan\u0131n yetkili bir sunucudan g\u00f6nderilip g\u00f6nderilmedi\u011fini kontrol ederken, DKIM e-postan\u0131n kendisinin yolculuk s\u0131ras\u0131nda de\u011fi\u015ftirilip de\u011fi\u015ftirilmedi\u011fini garanti alt\u0131na al\u0131r. Kriptografik bir imza kullanarak e-postan\u0131n b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc ve orijinalli\u011fini do\u011frulayan DKIM, e-posta g\u00fcvenli\u011finin ikinci \u00f6nemli katman\u0131n\u0131 olu\u015fturur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DKIM-Nedir\"><\/span>DKIM Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DomainKeys Identified Mail (DKIM), e-postalara dijital bir imza ekleyerek g\u00f6nderici kimli\u011fini do\u011frulayan bir y\u00f6ntemdir. Bu imza, g\u00f6nderen sunucu taraf\u0131ndan olu\u015fturulur ve e-postan\u0131n ba\u015fl\u0131\u011f\u0131na eklenir. Al\u0131c\u0131 sunucu, bu imzay\u0131 g\u00f6nderen alan ad\u0131n\u0131n DNS kay\u0131tlar\u0131nda yay\u0131nlanan bir genel anahtar (public key) ile do\u011frular. \u0130mza ge\u00e7erliyse, al\u0131c\u0131 sunucu e-postan\u0131n ger\u00e7ekten o alan ad\u0131ndan geldi\u011finden ve i\u00e7eri\u011finin (imzalanan k\u0131s\u0131mlar\u0131n\u0131n) yolda de\u011fi\u015ftirilmedi\u011finden emin olur. Bu, &#8220;man-in-the-middle&#8221; gibi sald\u0131r\u0131lara kar\u015f\u0131 \u00f6nemli bir koruma sa\u011flar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DKIMin-Calisma-Mantigi-Kriptografik-Imza-Sureci\"><\/span>DKIM&#8217;in \u00c7al\u0131\u015fma Mant\u0131\u011f\u0131: Kriptografik \u0130mza S\u00fcreci<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DKIM, asimetrik \u015fifreleme (public\/private key) prensibine dayan\u0131r. S\u00fcre\u00e7 \u00fc\u00e7 ana ad\u0131mdan olu\u015fur:<\/p>\n<h4>\u00d6zel Anahtar (Private Key) ile E-posta Ba\u015fl\u0131\u011f\u0131n\u0131n \u0130mzalanmas\u0131<\/h4>\n<p>Bir e-posta g\u00f6nderilece\u011fi zaman, g\u00f6nderen posta sunucusu e-postan\u0131n belirli ba\u015fl\u0131klar\u0131n\u0131 (\u00f6rne\u011fin, From, To, Subject, Date) ve i\u00e7eri\u011finin bir k\u0131sm\u0131n\u0131 se\u00e7er. Bu se\u00e7ilen verilerden bir &#8220;hash&#8221; (benzersiz bir dijital parmak izi) olu\u015fturur. Ard\u0131ndan, sunucuda gizli tutulan \u00f6zel anahtar (private key) ile bu &#8220;hash&#8221;i \u015fifreleyerek dijital imzay\u0131 olu\u015fturur. Bu imza, `DKIM-Signature` ad\u0131yla e-postan\u0131n ba\u015fl\u0131\u011f\u0131na eklenir.<\/p>\n<h4>Genel Anahtar\u0131n (Public Key) DNS&#8217;te Yay\u0131nlanmas\u0131<\/h4>\n<p>\u00d6zel anahtar\u0131n kar\u015f\u0131l\u0131\u011f\u0131 olan genel anahtar (public key), herkesin eri\u015febilece\u011fi \u015fekilde alan ad\u0131n\u0131n DNS kay\u0131tlar\u0131na \u00f6zel bir TXT kayd\u0131 olarak eklenir. Bu kay\u0131t, al\u0131c\u0131 sunucular\u0131n imzay\u0131 do\u011frulamak i\u00e7in ihtiya\u00e7 duydu\u011fu bilgiyi i\u00e7erir.<\/p>\n<h4>Al\u0131c\u0131 Sunucunun \u0130mzay\u0131 Do\u011frulamas\u0131<\/h4>\n<p>Al\u0131c\u0131 sunucu DKIM imzal\u0131 bir e-posta ald\u0131\u011f\u0131nda, `DKIM-Signature` ba\u015fl\u0131\u011f\u0131ndaki bilgilere bakar. Bu ba\u015fl\u0131k, imzay\u0131 do\u011frulamak i\u00e7in hangi alan ad\u0131n\u0131 (`d=` etiketi) ve hangi se\u00e7iciyi (`s=` etiketi) kullanmas\u0131 gerekti\u011fini belirtir. Al\u0131c\u0131 sunucu, bu bilgileri kullanarak DNS&#8217;ten ilgili genel anahtar\u0131 sorgular. Ard\u0131ndan, ald\u0131\u011f\u0131 e-postan\u0131n ayn\u0131 b\u00f6l\u00fcmlerinden kendi &#8220;hash&#8221;ini olu\u015fturur ve genel anahtar\u0131 kullanarak g\u00f6ndericinin imzas\u0131n\u0131 \u00e7\u00f6zer. E\u011fer \u00e7\u00f6z\u00fclen &#8220;hash&#8221; ile kendi olu\u015fturdu\u011fu &#8220;hash&#8221; e\u015fle\u015firse, imza do\u011frulanm\u0131\u015f olur ve DKIM kontrol\u00fc ba\u015far\u0131l\u0131 (Pass) say\u0131l\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DKIM-Kaydi-Sozdizimi-ve-Onemli-Etiketler-v-k-p-s\"><\/span>DKIM Kayd\u0131 S\u00f6zdizimi ve \u00d6nemli Etiketler (v, k, p, s)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bir DKIM kayd\u0131, etiket-de\u011fer \u00e7iftlerinden olu\u015fan bir TXT kayd\u0131d\u0131r. En temel etiketler \u015funlard\u0131r:<\/p>\n<ul>\n<li><b>v=DKIM1:<\/b> Kayd\u0131n s\u00fcr\u00fcm\u00fcn\u00fc belirtir. Her zaman `DKIM1` olmal\u0131d\u0131r.<\/li>\n<li><b>k=rsa:<\/b> Kullan\u0131lan \u015fifreleme algoritmas\u0131n\u0131 tan\u0131mlar. Genellikle `rsa` (Rivest-Shamir-Adleman) kullan\u0131l\u0131r.<\/li>\n<li><b>p=:<\/b> Bu etiket, base64 format\u0131nda kodlanm\u0131\u015f genel anahtar\u0131n (public key) kendisini i\u00e7erir. Bu, kayd\u0131n en \u00f6nemli ve en uzun k\u0131sm\u0131d\u0131r.<\/li>\n<li><b>s=:<\/b> Bu etiket, `DKIM-Signature` ba\u015fl\u0131\u011f\u0131nda belirtilen ve kullan\u0131lacak olan spesifik anahtar\u0131 tan\u0131mlayan &#8220;se\u00e7ici&#8221; (selector) de\u011feridir. DNS kayd\u0131n\u0131n kendisinde de\u011fil, sorgulama s\u0131ras\u0131nda kullan\u0131l\u0131r.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"DKIM-Secici-Selector-Kavrami-ve-Onemi\"><\/span>DKIM Se\u00e7ici (Selector) Kavram\u0131 ve \u00d6nemi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DKIM se\u00e7icisi (selector), bir alan ad\u0131n\u0131n ayn\u0131 anda birden fazla DKIM anahtar\u0131 kullanmas\u0131na olanak tan\u0131yan bir etikettir. Her se\u00e7ici, farkl\u0131 bir genel\/\u00f6zel anahtar \u00e7iftini temsil eder. Bu, \u00f6zellikle farkl\u0131 e-posta g\u00f6nderim hizmetleri (\u00f6rne\u011fin, pazarlama i\u00e7in bir servis, i\u015flem e-postalar\u0131 i\u00e7in ba\u015fka bir servis) kullanan kurulu\u015flar i\u00e7in \u00f6nemlidir. Her hizmet kendi se\u00e7icisini ve anahtar \u00e7iftini kullanabilir. \u00d6rne\u011fin, Google Workspace i\u00e7in `google` se\u00e7icisini, ba\u015fka bir hizmet i\u00e7in `s1` se\u00e7icisini kullanabilirsiniz. Se\u00e7ici, DNS kayd\u0131n\u0131n ad\u0131nda yer al\u0131r. \u00d6rne\u011fin: `google._domainkey.sirketim.com`.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DKIM-Kaydi-Olusturma-ve-DNSe-Ekleme-Adimlari\"><\/span>DKIM Kayd\u0131 Olu\u015fturma ve DNS&#8217;e Ekleme Ad\u0131mlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li><b>Anahtar \u00c7ifti Olu\u015fturun:<\/b> E-posta sunucunuzda veya kulland\u0131\u011f\u0131n\u0131z \u00fc\u00e7\u00fcnc\u00fc taraf hizmetin (Google Workspace, Microsoft 365 vb.) panelinde bir DKIM anahtar \u00e7ifti (\u00f6zel ve genel) olu\u015fturun. Bu i\u015flem genellikle size bir se\u00e7ici ad\u0131 (\u00f6rn. `google`) ve DNS&#8217;e eklemeniz gereken bir TXT kayd\u0131 de\u011feri (genel anahtar\u0131 i\u00e7eren) verir.<\/li>\n<li><b>DNS Kayd\u0131n\u0131 Haz\u0131rlay\u0131n:<\/b> Verilen bilgilere g\u00f6re DNS kayd\u0131n\u0131 olu\u015fturun. Kayd\u0131n ad\u0131, `se\u00e7ici._domainkey.alanadiniz.com` format\u0131nda olmal\u0131d\u0131r. \u00d6rne\u011fin: `google._domainkey.sirketim.com`.<\/li>\n<li><b>DNS&#8217;e Ekleyin:<\/b> DNS y\u00f6netim panelinize gidin ve yeni bir TXT kayd\u0131 olu\u015fturun. &#8220;Host&#8221; veya &#8220;Name&#8221; alan\u0131na `se\u00e7ici._domainkey` (alan ad\u0131n\u0131z genellikle otomatik eklenir) yaz\u0131n. &#8220;Value&#8221; veya &#8220;De\u011fer&#8221; alan\u0131na ise size verilen DKIM kayd\u0131 metnini (`v=DKIM1; k=rsa; p=&#8230;` \u015feklinde) yap\u0131\u015ft\u0131r\u0131n.<\/li>\n<li><b>G\u00f6nderen Servisi Yap\u0131land\u0131r\u0131n:<\/b> Son olarak, e-posta g\u00f6nderen sunucunuzda veya hizmetinizde DKIM imzalamas\u0131n\u0131 etkinle\u015ftirin. Bu, olu\u015fturdu\u011funuz \u00f6zel anahtar\u0131n giden e-postalar\u0131 imzalamak i\u00e7in kullan\u0131lmas\u0131n\u0131 sa\u011flar.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"DMARC-Domain-based-Message-Authentication-Reporting-and-Conformance-Kaydi\"><\/span>DMARC (Domain-based Message Authentication, Reporting, and Conformance) Kayd\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SPF ve DKIM, bir e-postan\u0131n me\u015fruiyetini do\u011frulamak i\u00e7in g\u00fc\u00e7l\u00fc mekanizmalar sunar, ancak al\u0131c\u0131 sunucuya bu do\u011frulamalar ba\u015far\u0131s\u0131z oldu\u011funda ne yapmas\u0131 gerekti\u011fini s\u00f6ylemezler. \u0130\u015fte bu bo\u015flu\u011fu <a href=\"https:\/\/www.ihs.com.tr\/blog\/dmarc-nedir\/\">DMARC<\/a> doldurur. DMARC, SPF ve DKIM kontrollerinin sonu\u00e7lar\u0131n\u0131 kullanarak alan ad\u0131n\u0131z i\u00e7in bir politika belirlemenize ve e-posta ak\u0131\u015f\u0131n\u0131z hakk\u0131nda de\u011ferli raporlar alman\u0131za olanak tan\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DMARC-Nedir\"><\/span>DMARC Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC (Domain-based Message Authentication, Reporting, and Conformance), e-posta g\u00f6ndericilerinin alan adlar\u0131n\u0131 e-posta sahtekarl\u0131\u011f\u0131na ve kimlik av\u0131 sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korumalar\u0131na yard\u0131mc\u0131 olan bir e-posta do\u011frulama politikas\u0131 ve raporlama protokol\u00fcd\u00fcr. Bir DNS TXT kayd\u0131 olarak yay\u0131nlan\u0131r ve al\u0131c\u0131 e-posta sunucular\u0131na, SPF veya DKIM kontrollerinden ge\u00e7emeyen e-postalara ne yapmalar\u0131 gerekti\u011fini (hi\u00e7bir \u015fey yapma, karantinaya al veya reddet) bildirir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DMARCin-SPF-ve-DKIM-Uzerindeki-Rolu\"><\/span>DMARC&#8217;\u0131n SPF ve DKIM \u00dczerindeki Rol\u00fc<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC, tek ba\u015f\u0131na bir do\u011frulama mekanizmas\u0131 de\u011fildir. Bunun yerine, mevcut SPF ve DKIM standartlar\u0131n\u0131n \u00fczerine in\u015fa edilmi\u015f bir politika katman\u0131d\u0131r. DMARC&#8217;\u0131n \u00e7al\u0131\u015fabilmesi i\u00e7in SPF ve\/veya DKIM&#8217;in yap\u0131land\u0131r\u0131lm\u0131\u015f olmas\u0131 gerekir. DMARC, bu iki mekanizman\u0131n sonu\u00e7lar\u0131n\u0131 birle\u015ftirir ve &#8220;hizalama&#8221; (alignment) ad\u0131 verilen ek bir kontrolle g\u00f6nderici kimli\u011fini daha kat\u0131 bir \u015fekilde do\u011frular. Bu sayede, &#8220;G\u00f6nderen&#8221; adresi sahte olan ancak SPF\/DKIM kontrol\u00fcn\u00fc ge\u00e7en karma\u015f\u0131k sald\u0131r\u0131lar\u0131 bile engelleyebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DMARC-Hizalama-Alignment-Kavrami\"><\/span>DMARC Hizalama (Alignment) Kavram\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hizalama, DMARC&#8217;\u0131n en temel ve g\u00fc\u00e7l\u00fc \u00f6zelli\u011fidir. Bir e-postan\u0131n DMARC kontrol\u00fcnden ge\u00e7ebilmesi i\u00e7in sadece SPF veya DKIM&#8217;den ge\u00e7mesi yeterli de\u011fildir; ayn\u0131 zamanda bu kontrollerde kullan\u0131lan alan ad\u0131n\u0131n, kullan\u0131c\u0131lar\u0131n g\u00f6rd\u00fc\u011f\u00fc &#8220;G\u00f6nderen&#8221; (From) ba\u015fl\u0131\u011f\u0131ndaki alan ad\u0131yla &#8220;hizal\u0131&#8221; olmas\u0131 gerekir.<\/p>\n<h4>SPF Hizalamas\u0131 (Relaxed vs. Strict)<\/h4>\n<p>SPF hizalamas\u0131, e-postan\u0131n &#8220;Return-Path&#8221; (veya &#8220;Mail From&#8221;) adresindeki alan ad\u0131n\u0131n, &#8220;From&#8221; ba\u015fl\u0131\u011f\u0131ndaki alan ad\u0131yla e\u015fle\u015fip e\u015fle\u015fmedi\u011fini kontrol eder.<\/p>\n<ul>\n<li><b>Strict (Kat\u0131):<\/b> \u0130ki alan ad\u0131n\u0131n tam olarak ayn\u0131 olmas\u0131 gerekir. (`mail.sirketim.com` ile `sirketim.com` e\u015fle\u015fmez).<\/li>\n<li><b>Relaxed (Esnek):<\/b> &#8220;Return-Path&#8221; adresindeki alan ad\u0131n\u0131n, &#8220;From&#8221; adresindeki alan ad\u0131n\u0131n bir alt alan ad\u0131 (subdomain) olmas\u0131na izin verilir. (`mail.sirketim.com` ile `sirketim.com` e\u015fle\u015fir).<\/li>\n<\/ul>\n<h4>DKIM Hizalamas\u0131 (Relaxed vs. Strict)<\/h4>\n<p>DKIM hizalamas\u0131, DKIM imzas\u0131ndaki `d=` etiketinde belirtilen alan ad\u0131n\u0131n, &#8220;From&#8221; ba\u015fl\u0131\u011f\u0131ndaki alan ad\u0131yla e\u015fle\u015fip e\u015fle\u015fmedi\u011fini kontrol eder.<\/p>\n<ul>\n<li><b>Strict (Kat\u0131):<\/b> \u0130ki alan ad\u0131n\u0131n tam olarak ayn\u0131 olmas\u0131 gerekir.<\/li>\n<li><b>Relaxed (Esnek):<\/b> \u0130mzadaki alan ad\u0131n\u0131n, &#8220;From&#8221; adresindeki alan ad\u0131n\u0131n bir alt alan ad\u0131 olmas\u0131na izin verilir.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"DMARC-Politikalari-Alici-Sunucuya-Talimat-Verme\"><\/span>DMARC Politikalar\u0131: Al\u0131c\u0131 Sunucuya Talimat Verme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC kayd\u0131n\u0131z\u0131n `p` etiketi, DMARC kontrol\u00fcnden ge\u00e7emeyen e-postalara ne yap\u0131laca\u011f\u0131n\u0131 belirler. Bu, DMARC&#8217;\u0131n en kritik par\u00e7as\u0131d\u0131r.<\/p>\n<div class=\"karsilastirma\">\n<table>\n<thead>\n<tr>\n<th>Politika<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<th>Kullan\u0131m Amac\u0131<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><b>p=none<\/b> (\u0130zleme Modu)<\/td>\n<td>Al\u0131c\u0131 sunucudan herhangi bir eyleme ge\u00e7memesi, sadece DMARC raporlar\u0131 g\u00f6ndermesi istenir. E-postalar normal \u015fekilde teslim edilir.<\/td>\n<td>DMARC&#8217;\u0131 ilk kez uygularken e-posta ak\u0131\u015f\u0131n\u0131z\u0131 izlemek, me\u015fru g\u00f6nderim kaynaklar\u0131n\u0131z\u0131 tespit etmek ve yap\u0131land\u0131rma sorunlar\u0131n\u0131 belirlemek i\u00e7in kullan\u0131l\u0131r.<\/td>\n<\/tr>\n<tr>\n<td><b>p=quarantine<\/b> (Karantina Modu)<\/td>\n<td>Al\u0131c\u0131 sunucudan, DMARC kontrol\u00fcnden ge\u00e7emeyen e-postalar\u0131 \u015f\u00fcpheli olarak i\u015faretlemesi ve genellikle spam\/junk klas\u00f6r\u00fcne ta\u015f\u0131mas\u0131 istenir.<\/td>\n<td>`p=none` modunda yeterli veri topland\u0131ktan sonra, sahte e-postalar\u0131n etkisini azaltmak i\u00e7in kullan\u0131lan bir ara ad\u0131md\u0131r.<\/td>\n<\/tr>\n<tr>\n<td><b>p=reject<\/b> (Reddetme Modu)<\/td>\n<td>Al\u0131c\u0131 sunucudan, DMARC kontrol\u00fcnden ge\u00e7emeyen e-postalar\u0131 tamamen reddetmesi ve al\u0131c\u0131ya hi\u00e7 teslim etmemesi istenir.<\/td>\n<td>En y\u00fcksek koruma seviyesidir. E-posta altyap\u0131n\u0131z\u0131n do\u011fru yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan tamamen emin oldu\u011funuzda kullan\u0131l\u0131r.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"DMARC-Kaydi-Sozdizimi-ve-Etiketleri-v-p-rua-ruf-pct-sp\"><\/span>DMARC Kayd\u0131 S\u00f6zdizimi ve Etiketleri (v, p, rua, ruf, pct, sp)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bir DMARC kayd\u0131, `_dmarc.alanadiniz.com` adresine eklenen bir TXT kayd\u0131d\u0131r ve \u015fu etiketleri i\u00e7erir:<\/p>\n<ul>\n<li><b>v=DMARC1:<\/b> S\u00fcr\u00fcm bilgisidir ve zorunludur.<\/li>\n<li><b>p=:<\/b> Uygulanacak politikay\u0131 belirtir (`none`, `quarantine`, `reject`). Zorunludur.<\/li>\n<li><b>rua=mailto:adres@sirketim.com:<\/b> Toplu (aggregate) raporlar\u0131n g\u00f6nderilece\u011fi e-posta adresini belirtir. Raporlama i\u00e7in \u015fiddetle tavsiye edilir.<\/li>\n<li><b>ruf=mailto:adres@sirketim.com:<\/b> Adli (forensic) yani bireysel hata raporlar\u0131n\u0131n g\u00f6nderilece\u011fi adresi belirtir. Bu raporlar hassas bilgiler i\u00e7erebilece\u011finden dikkatli kullan\u0131lmal\u0131d\u0131r.<\/li>\n<li><b>pct=100:<\/b> DMARC politikas\u0131n\u0131n, e-postalar\u0131n y\u00fczde ka\u00e7\u0131na uygulanaca\u011f\u0131n\u0131 belirtir. `10` gibi daha d\u00fc\u015f\u00fck bir de\u011ferle ba\u015flayarak politikay\u0131 a\u015famal\u0131 olarak uygulamak m\u00fcmk\u00fcnd\u00fcr. Varsay\u0131lan de\u011fer 100&#8217;d\u00fcr.<\/li>\n<li><b>sp=:<\/b> Ana alan ad\u0131 i\u00e7in belirtilen politikan\u0131n alt alan adlar\u0131 (subdomains) i\u00e7in de ge\u00e7erli olup olmayaca\u011f\u0131n\u0131 belirler. \u00d6rne\u011fin, `sp=reject` alt alan adlar\u0131 i\u00e7in de reddetme politikas\u0131 uygular.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"DMARC-Raporlamasinin-Onemi-Toplu-Aggregate-ve-Adli-Forensic-Raporlar\"><\/span>DMARC Raporlamas\u0131n\u0131n \u00d6nemi: Toplu (Aggregate) ve Adli (Forensic) Raporlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC&#8217;\u0131n en de\u011ferli \u00f6zelliklerinden biri raporlama yetene\u011fidir.<\/p>\n<ul>\n<li><b>Toplu Raporlar (RUA):<\/b> Genellikle g\u00fcnde bir kez g\u00f6nderilen XML format\u0131nda \u00f6zet raporlard\u0131r. Bu raporlar, hangi IP adreslerinin alan ad\u0131n\u0131z\u0131 kullanarak e-posta g\u00f6nderdi\u011fini, bunlar\u0131n SPF\/DKIM sonu\u00e7lar\u0131n\u0131 ve DMARC&#8217;tan ge\u00e7ip ge\u00e7medi\u011fini g\u00f6sterir. E-posta altyap\u0131n\u0131z\u0131 analiz etmek ve me\u015fru ama yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f kaynaklar\u0131 bulmak i\u00e7in hayati \u00f6nem ta\u015f\u0131r.<\/li>\n<li><b>Adli Raporlar (RUF):<\/b> Bir e-posta DMARC kontrol\u00fcnden her ba\u015far\u0131s\u0131z oldu\u011funda anl\u0131k olarak g\u00f6nderilen detayl\u0131 raporlard\u0131r. Bu raporlar, e-postan\u0131n ba\u015fl\u0131klar\u0131 gibi hassas veriler i\u00e7erebilir ve bir sahtekarl\u0131k giri\u015fiminin kayna\u011f\u0131n\u0131 ve tekni\u011fini anlamak i\u00e7in kullan\u0131labilir.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"DMARCi-Asamali-Olarak-Uygulama-Stratejisi\"><\/span>DMARC&#8217;\u0131 A\u015famal\u0131 Olarak Uygulama Stratejisi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC&#8217;\u0131 do\u011frudan `p=reject` politikas\u0131yla ba\u015flatmak, me\u015fru e-postalar\u0131n\u0131z\u0131n engellenmesine neden olabilir. Bu nedenle a\u015famal\u0131 bir yakla\u015f\u0131m izlemek en do\u011frusudur:<\/p>\n<ol>\n<li><b>\u0130zleme (p=none):<\/b> DMARC kayd\u0131n\u0131z\u0131 `p=none` ve `rua` etiketi ile olu\u015fturarak ba\u015flay\u0131n. Birka\u00e7 hafta boyunca gelen raporlar\u0131 analiz ederek t\u00fcm me\u015fru e-posta kaynaklar\u0131n\u0131z\u0131n do\u011fru \u015fekilde SPF ve DKIM ile yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<li><b>Karantina (p=quarantine):<\/b> Raporlarda beklenmedik bir sorun g\u00f6rm\u00fcyorsan\u0131z, politikan\u0131z\u0131 `p=quarantine` olarak g\u00fcncelleyin. Ba\u015flang\u0131\u00e7ta `pct=10` gibi d\u00fc\u015f\u00fck bir y\u00fczdeyle ba\u015flay\u0131p zamanla bu oran\u0131 art\u0131rarak etkiyi g\u00f6zlemleyebilirsiniz.<\/li>\n<li><b>Reddetme (p=reject):<\/b> Karantina modunda da her \u015feyin yolunda gitti\u011finden emin olduktan sonra, son ad\u0131m olarak politikan\u0131z\u0131 `p=reject` olarak g\u00fcncelleyerek alan ad\u0131n\u0131z i\u00e7in en \u00fcst d\u00fczey korumay\u0131 etkinle\u015ftirin.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"SPF-DKIM-ve-DMARCin-Birlikte-Calismasi\"><\/span>SPF, DKIM ve DMARC&#8217;\u0131n Birlikte \u00c7al\u0131\u015fmas\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SPF, DKIM ve DMARC, tek ba\u015flar\u0131na belirli g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatan g\u00fc\u00e7l\u00fc ara\u00e7lard\u0131r. Ancak as\u0131l g\u00fc\u00e7leri, bir e-posta do\u011frulama zinciri olu\u015fturmak i\u00e7in birlikte \u00e7al\u0131\u015ft\u0131klar\u0131nda ortaya \u00e7\u0131kar. Bu \u00fc\u00e7l\u00fc, birbirlerinin eksikliklerini tamamlayarak e-posta sahtekarl\u0131\u011f\u0131na ve kimlik av\u0131 sald\u0131r\u0131lar\u0131na kar\u015f\u0131 \u00e7ok katmanl\u0131 ve sa\u011flam bir savunma mekanizmas\u0131 kurar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"E-posta-Dogrulama-Zincirinin-Tamamlanmasi\"><\/span>E-posta Do\u011frulama Zincirinin Tamamlanmas\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bu \u00fc\u00e7 protokol\u00fcn g\u00f6rev da\u011f\u0131l\u0131m\u0131 \u015f\u00f6yledir:<\/p>\n<ul>\n<li><b>SPF:<\/b> &#8220;Bu e-postay\u0131 g\u00f6nderen sunucu, bu alan ad\u0131 ad\u0131na e-posta g\u00f6ndermeye yetkili mi?&#8221; sorusunu yan\u0131tlar. G\u00f6nderim kayna\u011f\u0131n\u0131n me\u015fruiyetini IP adresi baz\u0131nda do\u011frular.<\/li>\n<li><b>DKIM:<\/b> &#8220;Bu e-posta, g\u00f6nderildikten sonra yolda de\u011fi\u015ftirildi mi ve ger\u00e7ekten belirtilen alan ad\u0131ndan m\u0131 geliyor?&#8221; sorusunu yan\u0131tlar. E-postan\u0131n b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc ve orijinalli\u011fini kriptografik imza ile garanti eder.<\/li>\n<li><b>DMARC:<\/b> &#8220;SPF ve DKIM kontrollerinin sonu\u00e7lar\u0131, kullan\u0131c\u0131n\u0131n g\u00f6rd\u00fc\u011f\u00fc &#8216;G\u00f6nderen&#8217; adresiyle uyumlu mu? E\u011fer de\u011filse, bu e-postaya ne yapmal\u0131y\u0131m?&#8221; sorusunu yan\u0131tlar. Politikay\u0131 belirler, hizalamay\u0131 kontrol eder ve raporlama sa\u011flar.<\/li>\n<\/ul>\n<p>DMARC, SPF ve DKIM&#8217;den gelen sinyalleri birle\u015ftirerek nihai karar\u0131 verir ve e-posta ekosisteminde g\u00fcven olu\u015fturur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Bir-E-postanin-Yolculugu-Adim-Adim-Dogrulama-Senaryosu\"><\/span>Bir E-postan\u0131n Yolculu\u011fu: Ad\u0131m Ad\u0131m Do\u011frulama Senaryosu<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>`kullanici@sirketim.com` adresinden `alici@ornek.com` adresine bir e-posta g\u00f6nderildi\u011finde arka planda neler oldu\u011funu inceleyelim:<\/p>\n<ol>\n<li><b>G\u00f6nderim ve \u0130mzalama:<\/b> `sirketim.com`&#8217;un posta sunucusu, e-postay\u0131 g\u00f6ndermeden \u00f6nce kendi \u00f6zel DKIM anahtar\u0131yla imzalar.<\/li>\n<li><b>Al\u0131m:<\/b> `ornek.com`&#8217;un al\u0131c\u0131 sunucusu e-postay\u0131 al\u0131r.<\/li>\n<li><b>SPF Kontrol\u00fc:<\/b> Al\u0131c\u0131 sunucu, e-postay\u0131 g\u00f6nderen sunucunun IP adresini al\u0131r ve `sirketim.com`&#8217;un DNS kay\u0131tlar\u0131n\u0131 sorgulayarak bu IP&#8217;nin SPF kayd\u0131nda listelenip listelenmedi\u011fini kontrol eder.<\/li>\n<li><b>DKIM Kontrol\u00fc:<\/b> Al\u0131c\u0131 sunucu, e-posta ba\u015fl\u0131\u011f\u0131ndaki DKIM imzas\u0131n\u0131 g\u00f6r\u00fcr. \u0130lgili se\u00e7iciyi kullanarak `sirketim.com`&#8217;un DNS&#8217;inden genel DKIM anahtar\u0131n\u0131 al\u0131r ve imzan\u0131n ge\u00e7erli olup olmad\u0131\u011f\u0131n\u0131 do\u011frular.<\/li>\n<li><b>DMARC Kontrol\u00fc:<\/b> Al\u0131c\u0131 sunucu, `_dmarc.sirketim.com` adresindeki DMARC kayd\u0131n\u0131 sorgular.\n<ul>\n<li>SPF ve\/veya DKIM kontrollerinden en az birinin ba\u015far\u0131l\u0131 olup olmad\u0131\u011f\u0131n\u0131 kontrol eder.<\/li>\n<li>Ba\u015far\u0131l\u0131 olan kontrol\u00fcn (SPF veya DKIM) kulland\u0131\u011f\u0131 alan ad\u0131n\u0131n, e-postan\u0131n &#8220;G\u00f6nderen&#8221; ba\u015fl\u0131\u011f\u0131ndaki `sirketim.com` ile &#8220;hizal\u0131&#8221; olup olmad\u0131\u011f\u0131n\u0131 kontrol eder.<\/li>\n<\/ul>\n<\/li>\n<li><b>Karar ve Uygulama:<\/b> DMARC hizalama kontrol\u00fc ba\u015far\u0131l\u0131 olursa, e-posta g\u00fcvenilir kabul edilir ve gelen kutusuna teslim edilir. Ba\u015far\u0131s\u0131z olursa, al\u0131c\u0131 sunucu `sirketim.com`&#8217;un DMARC kayd\u0131ndaki politikaya (`p=quarantine` veya `p=reject`) g\u00f6re e-postay\u0131 spam klas\u00f6r\u00fcne ta\u015f\u0131r veya tamamen reddeder.<\/li>\n<li><b>Raporlama:<\/b> Al\u0131c\u0131 sunucu, bu i\u015flemin sonucunu `sirketim.com`&#8217;un DMARC kayd\u0131nda belirtilen `rua` adresine g\u00f6nderilecek olan toplu rapora ekler.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"Bu-Uc-Kaydin-E-posta-Itibarini-Sender-Reputation-Nasil-Guclendirdigi\"><\/span>Bu \u00dc\u00e7 Kayd\u0131n E-posta \u0130tibar\u0131n\u0131 (Sender Reputation) Nas\u0131l G\u00fc\u00e7lendirdi\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta servis sa\u011flay\u0131c\u0131lar\u0131 (Gmail, Outlook vb.), bir alan ad\u0131ndan gelen e-postalar\u0131n ne kadar g\u00fcvenilir oldu\u011funu belirlemek i\u00e7in &#8220;g\u00f6nderici itibar\u0131&#8221; (sender reputation) ad\u0131 verilen bir puanlama sistemi kullan\u0131r. D\u00fc\u015f\u00fck itibara sahip alan adlar\u0131ndan gelen e-postalar genellikle spam olarak i\u015faretlenir veya engellenir. SPF, DKIM ve DMARC&#8217;\u0131 do\u011fru bir \u015fekilde uygulamak, alan ad\u0131n\u0131z\u0131n sahtekarl\u0131k i\u00e7in kullan\u0131lmad\u0131\u011f\u0131n\u0131 kan\u0131tlar. Bu durum, e-posta servis sa\u011flay\u0131c\u0131lar\u0131n\u0131n g\u00f6z\u00fcnde <a href=\"https:\/\/www.ihs.com.tr\/blog\/alan-adi-reputasyonu-nedir\/\">alan ad\u0131 reputasyonu<\/a> itibar\u0131n\u0131z\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131r\u0131r. Y\u00fcksek itibar, e-postalar\u0131n\u0131z\u0131n al\u0131c\u0131lar\u0131n gelen kutusuna daha y\u00fcksek bir oranla teslim edilmesini (y\u00fcksek deliverability) sa\u011flar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"BIMI-Brand-Indicators-for-Message-Identification-ile-Iliskisi\"><\/span>BIMI (Brand Indicators for Message Identification) ile \u0130li\u015fkisi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>BIMI, bu do\u011frulama zincirinin \u00fczerine in\u015fa edilmi\u015f yeni bir standartt\u0131r. DMARC politikas\u0131 `p=quarantine` veya `p=reject` olarak ayarlanm\u0131\u015f ve tam uyumlu olan markalar\u0131n, al\u0131c\u0131lar\u0131n gelen kutusunda e-postalar\u0131n\u0131n yan\u0131nda kendi logolar\u0131n\u0131 g\u00f6stermelerine olanak tan\u0131r. BIMI, al\u0131c\u0131lar i\u00e7in g\u00f6rsel bir g\u00fcven i\u015fareti olu\u015fturarak marka g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fcn\u00fc art\u0131r\u0131r ve e-postan\u0131n me\u015fruiyetini an\u0131nda teyit eder. Ancak BIMI&#8217;nin \u00e7al\u0131\u015fmas\u0131 i\u00e7in SPF, DKIM ve kat\u0131 bir DMARC politikas\u0131 mutlak bir \u00f6n ko\u015fuldur. Bu da bu \u00fc\u00e7 temel kayd\u0131n ne kadar \u00f6nemli oldu\u011funu bir kez daha g\u00f6stermektedir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Uygulama-Test-ve-Sorun-Giderme\"><\/span>Uygulama, Test ve Sorun Giderme<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SPF, DKIM ve DMARC kay\u0131tlar\u0131n\u0131 do\u011fru bir \u015fekilde yap\u0131land\u0131rmak, e-posta g\u00fcvenli\u011fi ve iletilebilirli\u011fi i\u00e7in kritik \u00f6neme sahiptir. Ancak bu kay\u0131tlar\u0131 olu\u015fturup DNS&#8217;e eklemek i\u015fin sadece ilk ad\u0131m\u0131d\u0131r. Yap\u0131land\u0131rman\u0131n do\u011fru \u00e7al\u0131\u015ft\u0131\u011f\u0131ndan emin olmak, olas\u0131 sorunlar\u0131 tespit edip gidermek ve farkl\u0131 e-posta hizmetleriyle entegrasyonu sa\u011flamak da ayn\u0131 derecede \u00f6nemlidir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SPF-DKIM-ve-DMARC-Kayitlarini-Dogrulama-Araclari\"><\/span>SPF, DKIM ve DMARC Kay\u0131tlar\u0131n\u0131 Do\u011frulama Ara\u00e7lar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Kay\u0131tlar\u0131n\u0131z\u0131 DNS&#8217;e ekledikten sonra, bunlar\u0131n do\u011fru \u015fekilde yay\u0131nland\u0131\u011f\u0131n\u0131 ve s\u00f6zdiziminin ge\u00e7erli oldu\u011funu kontrol etmek i\u00e7in \u00e7e\u015fitli \u00e7evrimi\u00e7i ara\u00e7lar kullanabilirsiniz. MXToolbox, Dmarcian, Google Admin Toolbox (Check MX) gibi web siteleri, alan ad\u0131n\u0131z\u0131 girerek SPF, DKIM ve DMARC kay\u0131tlar\u0131n\u0131z\u0131 sorgulaman\u0131za ve olas\u0131 hatalar\u0131 veya uyar\u0131lar\u0131 g\u00f6rmenize olanak tan\u0131r. Bu ara\u00e7lar, yap\u0131land\u0131rman\u0131z\u0131n al\u0131c\u0131 sunucular taraf\u0131ndan nas\u0131l g\u00f6r\u00fcnd\u00fc\u011f\u00fcn\u00fc anlamak i\u00e7in paha bi\u00e7ilmezdir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Sik-Karsilasilan-Yapilandirma-Hatalari\"><\/span>S\u0131k Kar\u015f\u0131la\u015f\u0131lan Yap\u0131land\u0131rma Hatalar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Uygulama s\u00fcrecinde baz\u0131 yayg\u0131n hatalarla kar\u015f\u0131la\u015f\u0131labilir. Bunlar\u0131 bilmek, sorunlar\u0131 daha h\u0131zl\u0131 \u00e7\u00f6zmenize yard\u0131mc\u0131 olur.<\/p>\n<h4>&#8220;Too many DNS lookups&#8221; SPF Hatas\u0131<\/h4>\n<p>Bu, en yayg\u0131n SPF hatalar\u0131ndan biridir. SPF standard\u0131, bir SPF kayd\u0131n\u0131n i\u015flenmesi s\u0131ras\u0131nda en fazla 10 DNS sorgusu (lookup) yap\u0131lmas\u0131na izin verir. `include`, `a`, `mx` gibi mekanizmalar\u0131n her biri bir sorgu say\u0131l\u0131r. E\u011fer \u00e7ok say\u0131da \u00fc\u00e7\u00fcnc\u00fc taraf hizmet kullan\u0131yorsan\u0131z (her biri i\u00e7in bir `include` eklediyseniz), bu limiti kolayca a\u015fabilirsiniz. Limiti a\u015fan kay\u0131tlar ge\u00e7ersiz say\u0131l\u0131r ve SPF do\u011frulamas\u0131 ba\u015far\u0131s\u0131z olur. \u00c7\u00f6z\u00fcm, kullan\u0131lmayan `include` mekanizmalar\u0131n\u0131 kald\u0131rmak veya birden fazla IP&#8217;yi tek bir SPF kayd\u0131nda birle\u015ftiren hizmetleri kullanmakt\u0131r.<\/p>\n<h4>DKIM \u0130mza Hatalar\u0131<\/h4>\n<p>DKIM hatalar\u0131 genellikle birka\u00e7 nedenden kaynaklan\u0131r: DNS&#8217;e eklenen genel anahtar\u0131n yanl\u0131\u015f veya eksik olmas\u0131, g\u00f6nderen sunucunun e-postalar\u0131 \u00f6zel anahtarla do\u011fru \u015fekilde imzalamamas\u0131 veya e-postan\u0131n bir ara sunucu taraf\u0131ndan imzay\u0131 bozacak \u015fekilde de\u011fi\u015ftirilmesi. DKIM do\u011frulama ara\u00e7lar\u0131, DNS&#8217;teki anahtar ile e-posta ba\u015fl\u0131\u011f\u0131ndaki imzan\u0131n e\u015fle\u015fip e\u015fle\u015fmedi\u011fini kontrol ederek sorunun kayna\u011f\u0131n\u0131 bulman\u0131za yard\u0131mc\u0131 olabilir.<\/p>\n<h4>Yanl\u0131\u015f DMARC Politikas\u0131 Se\u00e7imi<\/h4>\n<p>En tehlikeli hatalardan biri, t\u00fcm me\u015fru e-posta kaynaklar\u0131n\u0131z\u0131 do\u011frulamadan DMARC politikas\u0131n\u0131 `p=reject` olarak ayarlamakt\u0131r. Bu durum, pazarlama e-postalar\u0131, bildirimler veya destek sisteminden gelen me\u015fru e-postalar gibi \u00f6nemli ileti\u015fimlerinizin al\u0131c\u0131lara hi\u00e7 ula\u015fmadan engellenmesine neden olabilir. Her zaman DMARC&#8217;\u0131 `p=none` ile ba\u015flat\u0131p raporlar\u0131 dikkatlice analiz ederek a\u015famal\u0131 bir strateji izlemek en g\u00fcvenli yoldur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Ucuncu-Taraf-E-posta-Servisleri-Google-Workspace-Microsoft-365-vb-icin-Yapilandirma\"><\/span>\u00dc\u00e7\u00fcnc\u00fc Taraf E-posta Servisleri (Google Workspace, Microsoft 365 vb.) i\u00e7in Yap\u0131land\u0131rma<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>\u00c7o\u011fu i\u015fletme, e-posta altyap\u0131s\u0131 i\u00e7in Google Workspace veya <a href=\"https:\/\/www.ihs.com.tr\/blog\/microsofttan-office-365-ve-exchange-2013-kullanicilarina-uyari\/\">Microsoft 365<\/a> gibi \u00fc\u00e7\u00fcnc\u00fc taraf hizmetleri kullan\u0131r. Bu hizmetler genellikle SPF, DKIM ve DMARC yap\u0131land\u0131rmas\u0131 i\u00e7in detayl\u0131 rehberler sunar.<\/p>\n<ul>\n<li><b>SPF:<\/b> Bu hizmetler, kendi SPF kayd\u0131n\u0131za `include` mekanizmas\u0131 ile eklemeniz gereken belirli bir alan ad\u0131 sa\u011flarlar (\u00f6rne\u011fin, `include:_spf.google.com`).<\/li>\n<li><b>DKIM:<\/b> Y\u00f6netim panelleri \u00fczerinden tek bir t\u0131klama ile bir DKIM anahtar\u0131 olu\u015fturman\u0131za ve bunu DNS&#8217;inize eklemeniz i\u00e7in gerekli olan se\u00e7ici ve TXT kayd\u0131 de\u011ferini size vermelerine olanak tan\u0131rlar.<\/li>\n<li><b>DMARC:<\/b> DMARC kayd\u0131n\u0131 sizin olu\u015fturman\u0131z gerekir, ancak bu hizmetlerin yard\u0131m dok\u00fcmanlar\u0131, kendi altyap\u0131lar\u0131yla uyumlu bir DMARC kayd\u0131n\u0131n nas\u0131l olu\u015fturulaca\u011f\u0131 konusunda yol g\u00f6sterir.<\/li>\n<\/ul>\n<p>Ayr\u0131ca Mailchimp, SendGrid gibi e-posta pazarlama hizmetleri de kullan\u0131yorsan\u0131z, bu servislerin de alan ad\u0131n\u0131z ad\u0131na e-posta g\u00f6ndermeleri i\u00e7in SPF ve DKIM kay\u0131tlar\u0131n\u0131zda yetkilendirilmeleri gerekir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"E-posta-Guvenligi-ve-DNS-Yonetimi-Icin-Neden-IHS-Telekomu-Tercih-Etmelisiniz\"><\/span>E-posta G\u00fcvenli\u011fi ve DNS Y\u00f6netimi \u0130\u00e7in Neden \u0130HS Telekom&#8217;u Tercih Etmelisiniz?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SPF, DKIM ve DMARC gibi kritik DNS kay\u0131tlar\u0131n\u0131n do\u011fru yap\u0131land\u0131r\u0131lmas\u0131 ve y\u00f6netilmesi, teknik uzmanl\u0131k ve g\u00fcvenilir bir altyap\u0131 gerektirir. E-posta g\u00fcvenli\u011finizi ve iletilebilirli\u011finizi en \u00fcst d\u00fczeye \u00e7\u0131karmak i\u00e7in do\u011fru i\u015f orta\u011f\u0131n\u0131 se\u00e7mek, t\u00fcm bu s\u00fcre\u00e7lerin sorunsuz i\u015flemesini sa\u011flar. \u0130HS Telekom, bu alanda sundu\u011fu \u00fcst\u00fcn hizmetlerle i\u015fletmenizin dijital ileti\u015fim altyap\u0131s\u0131n\u0131 g\u00fcvence alt\u0131na al\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Uzman-Teknik-Destek-ve-Danismanlik-Hizmetleri\"><\/span>Uzman Teknik Destek ve Dan\u0131\u015fmanl\u0131k Hizmetleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta do\u011frulama standartlar\u0131n\u0131 uygulamak, \u00f6zellikle birden fazla e-posta g\u00f6nderim kayna\u011f\u0131 olan karma\u015f\u0131k yap\u0131lar i\u00e7in zorlay\u0131c\u0131 olabilir. \u0130HS Telekom&#8217;un deneyimli teknik destek ekibi, SPF, DKIM ve DMARC kay\u0131tlar\u0131n\u0131z\u0131 olu\u015fturma, test etme ve sorun giderme s\u00fcre\u00e7lerinde size ad\u0131m ad\u0131m rehberlik eder. Olas\u0131 yap\u0131land\u0131rma hatalar\u0131n\u0131 \u00f6nleyerek me\u015fru e-postalar\u0131n\u0131z\u0131n kesintiye u\u011framamas\u0131n\u0131 sa\u011flarlar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Kullanici-Dostu-ve-Gelismis-DNS-Yonetim-Paneli\"><\/span>Kullan\u0131c\u0131 Dostu ve Geli\u015fmi\u015f DNS Y\u00f6netim Paneli<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>T\u00fcm bu kay\u0131tlar\u0131n y\u00f6netildi\u011fi yer DNS panelidir. \u0130HS Telekom, TXT, MX, CNAME gibi t\u00fcm DNS kay\u0131tlar\u0131n\u0131z\u0131 kolayca eklemenize, d\u00fczenlemenize ve y\u00f6netmenize olanak tan\u0131yan sezgisel ve g\u00fc\u00e7l\u00fc bir DNS y\u00f6netim paneli sunar. Karma\u015f\u0131k s\u00f6zdizimine sahip SPF veya DKIM kay\u0131tlar\u0131n\u0131 bile saniyeler i\u00e7inde ekleyebilir, TTL (Time to Live) s\u00fcrelerini ayarlayabilir ve de\u011fi\u015fikliklerinizi an\u0131nda yay\u0131nlayabilirsiniz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Yuksek-Performansli-ve-Guvenilir-DNS-Altyapisi\"><\/span>Y\u00fcksek Performansl\u0131 ve G\u00fcvenilir DNS Altyap\u0131s\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DNS sunucular\u0131n\u0131n h\u0131z\u0131 ve eri\u015filebilirli\u011fi, e-posta do\u011frulama s\u00fcre\u00e7lerinin performans\u0131 i\u00e7in hayati \u00f6nem ta\u015f\u0131r. Al\u0131c\u0131 sunucular, her e-posta i\u00e7in DNS sorgular\u0131 yapar ve bu sorgulara h\u0131zl\u0131 yan\u0131t alamazlarsa do\u011frulama s\u00fcrecinde zaman a\u015f\u0131mlar\u0131 ya\u015fanabilir. \u0130HS Telekom&#8217;un co\u011frafi olarak yedekli ve y\u00fcksek performansl\u0131 DNS altyap\u0131s\u0131, DNS sorgular\u0131n\u0131z\u0131n d\u00fcnyan\u0131n her yerinden en d\u00fc\u015f\u00fck gecikmeyle yan\u0131tlanmas\u0131n\u0131 sa\u011flayarak e-posta teslimatlar\u0131n\u0131z\u0131n sorunsuz ger\u00e7ekle\u015fmesine katk\u0131da bulunur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"E-posta-Guvenliginizi-Tamamlayan-Diger-Hizmetler-SSL-Guvenlik-Duvari-vb\"><\/span>E-posta G\u00fcvenli\u011finizi Tamamlayan Di\u011fer Hizmetler (SSL, G\u00fcvenlik Duvar\u0131 vb.)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E-posta g\u00fcvenli\u011fi, sadece DNS kay\u0131tlar\u0131ndan ibaret de\u011fildir. \u0130HS Telekom, b\u00fct\u00fcnsel bir g\u00fcvenlik yakla\u015f\u0131m\u0131 sunar. Web siteniz ve posta sunucunuz aras\u0131ndaki veri ileti\u015fimini \u015fifreleyen <a href=\"https:\/\/www.ihs.com.tr\/blog\/ssl-sertifikasi-nedir-onemlidir\/\">SSL<\/a> sertifikalar\u0131, sunucular\u0131n\u0131z\u0131 d\u0131\u015f tehditlere kar\u015f\u0131 koruyan geli\u015fmi\u015f <a href=\"https:\/\/www.ihs.com.tr\/blog\/firewall-nedir-ne-ise-yarar\/\">G\u00fcvenlik Duvar\u0131<\/a> (Firewall) \u00e7\u00f6z\u00fcmleri ve g\u00fcvenli hosting altyap\u0131s\u0131 ile dijital varl\u0131klar\u0131n\u0131z i\u00e7in 360 derece koruma sa\u011flar. Bu hizmetler, SPF, DKIM ve DMARC ile birlikte \u00e7al\u0131\u015farak markan\u0131z ve m\u00fc\u015fterileriniz i\u00e7in tam bir g\u00fcvenlik kalkan\u0131 olu\u015fturur.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dijital ileti\u015fimin temel ta\u015f\u0131 olan e-posta, i\u015fletmeler i\u00e7in hayati bir ara\u00e7 olmaya devam ediyor. Ancak bu vazge\u00e7ilmezlik, onu siber sald\u0131rganlar i\u00e7in de&hellip;<\/p>\n","protected":false},"author":3,"featured_media":15237,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398],"tags":[],"class_list":["post-15236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alan-adi"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=15236"}],"version-history":[{"count":1,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15236\/revisions"}],"predecessor-version":[{"id":15238,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15236\/revisions\/15238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/15237"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=15236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=15236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=15236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}