From da6d294f71d8932ba2317a08852765c4dac21f88 Mon Sep 17 00:00:00 2001 From: adamshep-msft <131991605+adamshep-msft@users.noreply.github.com> Date: Thu, 3 Jul 2025 12:51:35 +0200 Subject: [PATCH] Fixed typo in email-authentication-about.md Adjusted page that said "Our system using a ..." and changed it to "Our system uses a ..." --- defender-office-365/email-authentication-about.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/defender-office-365/email-authentication-about.md b/defender-office-365/email-authentication-about.md index 6fba883ff0..ea4ddf0904 100644 --- a/defender-office-365/email-authentication-about.md +++ b/defender-office-365/email-authentication-about.md @@ -180,7 +180,7 @@ These values are explained at [Authentication-results message header](message-he Admins and users can examine the message headers to discover how Microsoft 365 identified the sender as a suspicious spoofed sender or legitimate. > [!TIP] -> It's important to understand that a composite authentication failure doesn't directly result in a message being blocked. Our system using a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices. +> It's important to understand that a composite authentication failure doesn't directly result in a message being blocked. Our system uses a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices. The following examples focus on the results of email authentication only (the `compauth` value and reason). Other Microsoft 365 protection technologies can identify messages that pass email authentication as spoofed, or identify messages that fail email authentication as legitimate.