You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The DmarcQuarantineAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
169
+
170
+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder.
171
+
- Quarantine: This is the default value. Move the message to quarantine.
172
+
173
+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
174
+
175
+
```yaml
176
+
Type: SpoofDmarcQuarantineAction
177
+
Parameter Sets: (All)
178
+
Aliases:
179
+
Applicable: Exchange Online
180
+
181
+
Required: False
182
+
Position: Named
183
+
Default value: None
184
+
Accept pipeline input: False
185
+
Accept wildcard characters: False
186
+
```
187
+
188
+
### -DmarcRejectAction
189
+
This setting is part of spoof protection.
190
+
191
+
The DmarcRejectAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
192
+
193
+
- Quarantine: This is the default value. Move the message to quarantine.
194
+
- Reject: Reject the message.
195
+
196
+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
197
+
198
+
```yaml
199
+
Type: SpoofDmarcRejectAction
200
+
Parameter Sets: (All)
201
+
Aliases:
202
+
Applicable: Exchange Online
203
+
204
+
Required: False
205
+
Position: Named
206
+
Default value: None
207
+
Accept pipeline input: False
208
+
Accept wildcard characters: False
209
+
```
210
+
162
211
### -Enabled
163
212
This parameter is reserved for internal Microsoft use.
164
213
@@ -487,6 +536,27 @@ Accept pipeline input: False
487
536
Accept wildcard characters: False
488
537
```
489
538
539
+
### -HonorDmarcPolicy
540
+
This setting is part of spoof protection.
541
+
542
+
The HonorDmarcPolicy parameter specifies whether to use the `p=` policy action in the DMARC DNS (TXT) record for the domain when spoofing is detected. Valid values are:
543
+
544
+
- $true: If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=quarantine`, use the action that's specified by the DmarcQuarantineAction parameter. If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=reject`, use the action that's specified by the DmarcRejectAction parameter.
545
+
- $false: This is the default value. If spoofing is detected, use the action that's specified by the AuthenticationFailAction parameter.
546
+
547
+
```yaml
548
+
Type: Boolean
549
+
Parameter Sets: (All)
550
+
Aliases:
551
+
Applicable: Exchange Online
552
+
553
+
Required: False
554
+
Position: Named
555
+
Default value: None
556
+
Accept pipeline input: False
557
+
Accept wildcard characters: False
558
+
```
559
+
490
560
### -ImpersonationProtectionState
491
561
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
The DmarcQuarantineAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
172
+
173
+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder.
174
+
- Quarantine: This is the default value. Move the message to quarantine.
175
+
176
+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
177
+
178
+
```yaml
179
+
Type: SpoofDmarcQuarantineAction
180
+
Parameter Sets: (All)
181
+
Aliases:
182
+
Applicable: Exchange Online
183
+
184
+
Required: False
185
+
Position: Named
186
+
Default value: None
187
+
Accept pipeline input: False
188
+
Accept wildcard characters: False
189
+
```
190
+
191
+
### -DmarcRejectAction
192
+
This setting is part of spoof protection.
193
+
194
+
The DmarcRejectAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
195
+
196
+
- Quarantine: This is the default value. Move the message to quarantine.
197
+
- Reject: Reject the message.
198
+
199
+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
200
+
201
+
```yaml
202
+
Type: SpoofDmarcRejectAction
203
+
Parameter Sets: (All)
204
+
Aliases:
205
+
Applicable: Exchange Online
206
+
207
+
Required: False
208
+
Position: Named
209
+
Default value: None
210
+
Accept pipeline input: False
211
+
Accept wildcard characters: False
212
+
```
213
+
165
214
### -Enabled
166
215
This parameter is reserved for internal Microsoft use.
167
216
@@ -490,6 +539,27 @@ Accept pipeline input: False
490
539
Accept wildcard characters: False
491
540
```
492
541
542
+
### -HonorDmarcPolicy
543
+
This setting is part of spoof protection.
544
+
545
+
The HonorDmarcPolicy parameter specifies whether to use the `p=` policy action in the DMARC DNS (TXT) record for the domain when spoofing is detected. Valid values are:
546
+
547
+
- $true: If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=quarantine`, use the action that's specified by the DmarcQuarantineAction parameter. If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=reject`, use the action that's specified by the DmarcRejectAction parameter.
548
+
- $false: This is the default value. If spoofing is detected, use the action that's specified by the AuthenticationFailAction parameter.
549
+
550
+
```yaml
551
+
Type: Boolean
552
+
Parameter Sets: (All)
553
+
Aliases:
554
+
Applicable: Exchange Online
555
+
556
+
Required: False
557
+
Position: Named
558
+
Default value: None
559
+
Accept pipeline input: False
560
+
Accept wildcard characters: False
561
+
```
562
+
493
563
### -ImpersonationProtectionState
494
564
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
0 commit comments