Skip to content

Commit e8395a0

Browse files
committed
Fixes per build report
1 parent e21c0c5 commit e8395a0

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

defender-office-365/email-auth-sec-ops-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier2
1616
ms.custom: TopSMBIssues
17-
ms.localizationpriority: normal
17+
ms.localizationpriority: medium
1818
description: Admins can learn about pass and fail scenarios for email authentication in Microsoft 365.
1919
ms.service: defender-office-365
2020
ms.date: 10/08/2025
@@ -43,7 +43,7 @@ But first, a few definitions as described in the following table:
4343
|[DKIM](email-authentication-dkim-configure.md)|DomainKeys Identified Mail. Digitally signs important elements of a message (including the From address header) to verify the message wasn't altered in transit, which helps prevent spoofing.|
4444
|[DMARC](email-authentication-dmarc-configure.md)|Domain-based Message Authentication, Reporting, and Conformance. Uses SPF and DKIM results to verify alignment between domains in the MAIL FROM address and From address to help prevent spoofing.|
4545
|[ARC](email-authentication-arc-configure.md)|Authenticated Received Chain. Preserve email authentication results across intermediaries that modify messages in transit.|
46-
|[compauth](email-authentication-about#composite-authentication.md)|Composite authentication. A proprietary Microsoft 365 technology that combines multiple email authentication signals.|
46+
|[compauth](email-authentication-about.md#composite-authentication)|Composite authentication. A proprietary Microsoft 365 technology that combines multiple email authentication signals.|
4747
|MAIL FROM address|Also known as the `5321.MailFrom` address, P1 sender, or envelope sender. Used in the transmission of messages between SMTP email servers. Typically recorded in the **Return-Path** header field in the message header. Used as the address for non-delivery reports (also known as NDRs or bounce messages).|
4848
|From address|Also known as the `5322.From` address or P2 sender. The email address in the **From** header field. Shown as the sender's email address in email clients.|
4949

defender-office-365/message-headers-eop-mdo.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -169,18 +169,18 @@ The following table describes the three-digit `reason` codes used with `compauth
169169
|002|The organization has a policy for the sender/domain pair that's explicitly prohibited from sending spoofed email. An admin manually configures this setting.|
170170
|010|The message failed DMARC, the DMARC policy action is `p=reject` or `p=quarantine`, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).|
171171
|1xx|The message passed implicit authentication (`compauth=pass`).|
172-
| &nbsp100|SPF passed or DKIM passed and the domains in the MAIL FROM and From addresses are aligned.|
173-
| &nbsp101|The message was DKIM signed by the domain used in the From address.|
174-
| &nbsp102|The MAIL FROM and From address domains were aligned, and SPF passed.|
175-
| &nbsp103|The From address domain aligns with the DNS PTR record (reverse lookup) associated with the source IP address|
176-
| &nbsp104|The DNS PTR record (reverse lookup) associated with the source IP address aligns with the From address domain.|
177-
| &nbsp108|DKIM failed due to a message body modification attributed to previous legitimate hops. For example, the message body was modified in the organization's on-premises email environment.|
178-
| &nbsp109|Although the sender's domain has no DMARC record, the message would pass, anyway.|
179-
| &nbsp111|Despite a DMARC temporary error or permanent error, the SPF or DKIM domain aligns with the From address domain.|
180-
| &nbsp112|A DNS timeout prevented the DMARC record from being retrieved.|
181-
| &nbsp115|The message was sent from a Microsoft 365 organization where the From address domain is configured as an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).|
182-
| &nbsp116|The MX record for the From address domain aligns with the PTR record (reverse lookup) of the connecting IP address.|
183-
| &nbsp130|The ARC result from a [trusted ARC sealer](email-authentication-arc-configure.md) overrode the DMARC failure.|
172+
|  100|SPF passed or DKIM passed and the domains in the MAIL FROM and From addresses are aligned.|
173+
|  101|The message was DKIM signed by the domain used in the From address.|
174+
|  102|The MAIL FROM and From address domains were aligned, and SPF passed.|
175+
|  103|The From address domain aligns with the DNS PTR record (reverse lookup) associated with the source IP address|
176+
|  104|The DNS PTR record (reverse lookup) associated with the source IP address aligns with the From address domain.|
177+
|  108|DKIM failed due to a message body modification attributed to previous legitimate hops. For example, the message body was modified in the organization's on-premises email environment.|
178+
|  109|Although the sender's domain has no DMARC record, the message would pass, anyway.|
179+
|  111|Despite a DMARC temporary error or permanent error, the SPF or DKIM domain aligns with the From address domain.|
180+
|  112|A DNS timeout prevented the DMARC record from being retrieved.|
181+
|  115|The message was sent from a Microsoft 365 organization where the From address domain is configured as an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).|
182+
|  116|The MX record for the From address domain aligns with the PTR record (reverse lookup) of the connecting IP address.|
183+
|  130|The ARC result from a [trusted ARC sealer](email-authentication-arc-configure.md) overrode the DMARC failure.|
184184
|2xx|The message soft-passed implicit authentication (`compauth=softpass`).|
185185
|3xx|The message wasn't checked for composite authentication (`compauth=none`).|
186186
|4xx|The message bypassed composite authentication (`compauth=none`).|

0 commit comments

Comments
 (0)