Skip to content

Commit 51667a8

Browse files
authored
Update email-authentication-arc-configure.md
customers are getting confused on scenarios when ARC is failing thinking that it will impact the EOP decision to either reject or pass the message - discussed with our Beta engineer Mithun and agreed to update the documentation with this statement
1 parent c1abed0 commit 51667a8

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

defender-office-365/email-authentication-arc-configure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,10 @@ smtp.mailfrom=contoso.com; dkim=fail (body hash did not verify)
145145
header.d=contoso.com;dmarc=fail action=none
146146
header.from=contoso.com;compauth=pass reason=130
147147
```
148+
> **Note:**
149+
> When the ARC result is **pass** and originates from a **trusted ARC sealer**, it can be used to preserve authentication context and potentially override failures in SPF, DKIM, or DMARC caused by message modifications during transit.
150+
> However, the final spoofing determination is based on the **Composite Authentication (CompAuth)** outcome. A message may still be delivered even if ARC fails, provided SPF, DKIM, and DMARC evaluations, along with CompAuth, result in a pass.
151+
148152

149153
## Trusted ARC sealer mail flow diagrams
150154

0 commit comments

Comments
 (0)