diff --git a/defender-office-365/email-authentication-arc-configure.md b/defender-office-365/email-authentication-arc-configure.md index b0c6ebfd13..6af672d20d 100644 --- a/defender-office-365/email-authentication-arc-configure.md +++ b/defender-office-365/email-authentication-arc-configure.md @@ -17,7 +17,7 @@ ms.custom: - seo-marvel-apr2020 description: Authenticated Received Chain (ARC) is an email authentication method that tries to preserve authentication results across devices and any message modification that occurs between the sender and recipient. ms.service: defender-office-365 -ms.date: 1/29/2024 +ms.date: 04/30/2025 appliesto: - ✅ Exchange Online Protection - ✅ Microsoft Defender for Office 365 Plan 1 and Plan 2 @@ -146,6 +146,10 @@ header.d=contoso.com;dmarc=fail action=none header.from=contoso.com;compauth=pass reason=130 ``` +> [!NOTE] +> The ARC result **pass** from a **trusted ARC sealer** can potentially override failures in SPF, DKIM, or DMARC caused by message modification during transit. However, the final spoofing determination is based on the [composite authentication](email-authentication-about.md#composite-authentication) (CompAuth) outcome. Messages that fail ARC might still be delivered if they pass SPF, DKIM, DMARC, and composite authentication evaluations. + + ## Trusted ARC sealer mail flow diagrams The diagrams in this section contrast mail flow and the affect on email authentication results with and without a trusted ARC sealer. In both diagrams, the Microsoft 365 organization uses a legitimate email service that modifies inbound mail before delivered into Microsoft 365. This modification interrupts mail flow, which can cause email authentication failures by changing the source IP and updating the email message header.