Skip to content

Commit 49347d6

Browse files
Merge pull request #3625 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 6ab61df + ce91af4 commit 49347d6

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

defender-office-365/email-authentication-arc-configure.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- seo-marvel-apr2020
1818
description: Authenticated Received Chain (ARC) is an email authentication method that tries to preserve authentication results across devices and any message modification that occurs between the sender and recipient.
1919
ms.service: defender-office-365
20-
ms.date: 1/29/2024
20+
ms.date: 04/30/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -146,6 +146,10 @@ header.d=contoso.com;dmarc=fail action=none
146146
header.from=contoso.com;compauth=pass reason=130
147147
```
148148

149+
> [!NOTE]
150+
> The ARC result **pass** from a **trusted ARC sealer** can potentially override failures in SPF, DKIM, or DMARC caused by message modification during transit. However, the final spoofing determination is based on the [composite authentication](email-authentication-about.md#composite-authentication) (CompAuth) outcome. Messages that fail ARC might still be delivered if they pass SPF, DKIM, DMARC, and composite authentication evaluations.
151+
152+
149153
## Trusted ARC sealer mail flow diagrams
150154

151155
The diagrams in this section contrast mail flow and the affect on email authentication results with and without a trusted ARC sealer. In both diagrams, the Microsoft 365 organization uses a legitimate email service that modifies inbound mail before delivered into Microsoft 365. This modification interrupts mail flow, which can cause email authentication failures by changing the source IP and updating the email message header.

0 commit comments

Comments
 (0)