diff --git a/defender-office-365/email-authentication-arc-configure.md b/defender-office-365/email-authentication-arc-configure.md
index b0c6ebfd13..6af672d20d 100644
--- a/defender-office-365/email-authentication-arc-configure.md
+++ b/defender-office-365/email-authentication-arc-configure.md
@@ -17,7 +17,7 @@ ms.custom:
- seo-marvel-apr2020
description: Authenticated Received Chain (ARC) is an email authentication method that tries to preserve authentication results across devices and any message modification that occurs between the sender and recipient.
ms.service: defender-office-365
-ms.date: 1/29/2024
+ms.date: 04/30/2025
appliesto:
- ✅ Exchange Online Protection
- ✅ Microsoft Defender for Office 365 Plan 1 and Plan 2
@@ -146,6 +146,10 @@ header.d=contoso.com;dmarc=fail action=none
header.from=contoso.com;compauth=pass reason=130
```
+> [!NOTE]
+> The ARC result **pass** from a **trusted ARC sealer** can potentially override failures in SPF, DKIM, or DMARC caused by message modification during transit. However, the final spoofing determination is based on the [composite authentication](email-authentication-about.md#composite-authentication) (CompAuth) outcome. Messages that fail ARC might still be delivered if they pass SPF, DKIM, DMARC, and composite authentication evaluations.
+
+
## Trusted ARC sealer mail flow diagrams
The diagrams in this section contrast mail flow and the affect on email authentication results with and without a trusted ARC sealer. In both diagrams, the Microsoft 365 organization uses a legitimate email service that modifies inbound mail before delivered into Microsoft 365. This modification interrupts mail flow, which can cause email authentication failures by changing the source IP and updating the email message header.