You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/email-auth-sec-ops-guide.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ These scenarios describe messages that **passed email authentication checks** or
90
90
> [!NOTE]
91
91
> In mail forwarding scenarios where the forwarding service is another Microsoft 365 organization, you don't need to configure **trusted ARC sealers** for **microsoft.com**. ARC signatures are automatically trusted by receiving Microsoft 365 organizations when the message passes validation.
92
92
93
-
### Message delivered to allow entries for spoofed senders in the Tenant Allow/Block List
93
+
### Message delivered due to allow entries for spoofed senders in the Tenant Allow/Block List
94
94
95
95
-**What it means**: The message bypassed normal authentication failure actions because [allow entries for spoofed senders exist in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders). In Microsoft 365, an allow entry for spoofed senders can override failures. Even when email authentication checks normally fail, the message is allowed due to this explicit trust configuration.
96
96
-**Header example**: `compauth=fail reason=000` (but an organization policy allowed the message: **Tenant Allow/Block List spoof allowed**).
@@ -99,7 +99,7 @@ These scenarios describe messages that **passed email authentication checks** or
99
99
100
100
Generally, **there's no immediate action** for these messages, since they're intentionally allowed. However, it's good practice for admins to **periodically review allow entries for spoofed senders** to ensure only necessary senders are allowed. Overusing the Tenant Allow/Block List allows delivery of (possibly malicious) messages that would normally fail authentication checks.
101
101
102
-
### 6. Authenticated via PTR (reverse DNS) alignment
102
+
### Authenticated via PTR (reverse DNS) alignment
103
103
104
104
-**Header example**: `compauth=pass` with codes like `reason=116` or `reason=111` to indicate PTR record use.
105
105
-**What it means**: The message passed authentication **based on PTR (reverse DNS) validation** as a fallback. In some cases when SPF and DKIM checks don't yield a conclusive pass, Microsoft 365 can look at the sender's PTR record. If the sending server's IP address has a PTR record (reverse DNS) that matches the domain in the message's **From** address, the system might treat the message as authenticated.
@@ -225,7 +225,7 @@ This section contains a simplified table that summarizes the scenarios, the reco
225
225
|ARC validated (non-Microsoft service trusted via ARC)|No action needed (if message modification by a non-Microsoft service is expected). Ensure non-Microsoft services use ARC.|[Configure trusted ARC sealers](email-authentication-arc-configure.md)|
226
226
|Allowed by Tenant Allow/Block List (allowed by organization policy: Tenant Allow/Block List spoof allowed)|No immediate action required. Admins should periodically review allow entries for spoofed senders.|[View entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#use-the-microsoft-defender-portal-to-view-entries-for-spoofed-senders-in-the-tenant-allowblock-list)|
227
227
|Authenticated via PTR record (reverse DNS lookup)|Sender should configure SPF or DKIM (don't rely on PTR lookup).|[Set up SPF identify valid email sources for your Microsoft 365 domain](email-authentication-spf-configure.md)|
228
-
|DMARC Failed (policy quarantine or reject)|Sender to ensure: <ul><li>SPF or DKIM pass.</li><li>MAIL FROM domain or DKIM signing domain is aligned with the From domain.</li></ul>. <br/> Recipient to configure Enhanced Filtering for Connectors and ARC in complex mail routing scenarios (intermediary services). <br/.<br/> Recipient to consider shifting message modifications (footers, disclaimers, subject, etc.) to Microsoft 365 to prevent DKIM failures.|[Use DMARC to validate email](email-authentication-dmarc-configure.md) <br/><br/> [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) <br/><br/> [Configure trusted ARC sealers](email-authentication-arc-configure.md) <br/><br/> [Considerations for integrating non-Microsoft security services with Microsoft 365](mdo-integrate-security-service.md)|
228
+
|DMARC Failed (policy quarantine or reject)|Sender to ensure: <ul><li>SPF or DKIM pass.</li><li>MAIL FROM domain or DKIM signing domain is aligned with the From domain.</li></ul> <br/> Recipient to configure Enhanced Filtering for Connectors and ARC in complex mail routing scenarios (intermediary services). <br/><br/> Recipient to consider shifting message modifications (footers, disclaimers, subject, etc.) to Microsoft 365 to prevent DKIM failures.|[Use DMARC to validate email](email-authentication-dmarc-configure.md) <br/><br/> [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) <br/><br/> [Configure trusted ARC sealers](email-authentication-arc-configure.md) <br/><br/> [Considerations for integrating non-Microsoft security services with Microsoft 365](mdo-integrate-security-service.md)|
229
229
|SPF check failed|Sender to update SPF record (include all source IP addresses and fix errors).|[Set up SPF identify valid email sources for your Microsoft 365 domain](email-authentication-spf-configure.md)|
230
230
|DKIM none|Sender should configure DKIM signing using the From address domain.|[How to use DKIM for email in your custom domain](email-authentication-dkim-configure.md)|
231
231
|DKIM check failed (no key for signature)|Sender should correct DKIM configuration for the domain (publish the DKIM public key).|[Set up DKIM](email-authentication-dkim-configure.md)|
Copy file name to clipboardExpand all lines: defender-office-365/message-headers-eop-mdo.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -168,7 +168,7 @@ The following table describes the three-digit `reason` codes used with `compauth
168
168
|001|The message failed implicit authentication (`compauth=fail`). The sending domain didn't have email authentication records published, or if they did, they had a weaker failure policy (SPF `~all` or `?all`, or a DMARC policy of `p=none`).|
169
169
|002|The organization has a policy for the sender/domain pair that's explicitly prohibited from sending spoofed email. An admin manually configures this setting.|
170
170
|010|The message failed DMARC, the DMARC policy action is `p=reject` or `p=quarantine`, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).|
|6xx|The message failed implicit email authentication (`compauth=fail`). The sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing)|
189
+
|501|DMARC wasn't enforced. The message is a valid non-delivery report (also known as an NDR or bounce message), and contact between the sender and recipient is previously established.|
190
+
|502|DMARC wasn't enforced. The message is a valid NDR for a message sent from this organization.|
| 601|The sending domain is an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in your organization (self-to-self or intra-org spoofing).|
| 905|DMARC wasn't enforced due to complex routing. For example, internet messages are routed through an on-premises Exchange environment or a non-Microsoft service before reaching Microsoft 365.|
0 commit comments