Skip to content

Commit 2d19283

Browse files
committed
DMARC spoof
1 parent c400007 commit 2d19283

File tree

2 files changed

+140
-0
lines changed

2 files changed

+140
-0
lines changed

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ New-AntiPhishPolicy [-Name] <String>
2525
[-AdminDisplayName <String>]
2626
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2727
[-Confirm]
28+
[-DmarcQuarantineAction <SpoofDmarcQuarantineAction>]
29+
[-DmarcRejectAction <SpoofDmarcRejectAction>]
2830
[-Enabled <Boolean>]
2931
[-EnableFirstContactSafetyTips <Boolean>]
3032
[-EnableMailboxIntelligence <Boolean>]
@@ -40,6 +42,7 @@ New-AntiPhishPolicy [-Name] <String>
4042
[-EnableViaTag <Boolean>]
4143
[-ExcludedDomains <MultiValuedProperty>]
4244
[-ExcludedSenders <MultiValuedProperty>]
45+
[-HonorDmarcPolicy <Boolean>]
4346
[-ImpersonationProtectionState <ImpersonationProtectionState>]
4447
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
4548
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
@@ -159,6 +162,52 @@ Accept pipeline input: False
159162
Accept wildcard characters: False
160163
```
161164

165+
### -DmarcQuarantineAction
166+
This setting is part of spoof protection.
167+
168+
The DmarcQuarantineAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
169+
170+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder.
171+
- Quarantine: This is the default value. Move the message to quarantine.
172+
173+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
174+
175+
```yaml
176+
Type: SpoofDmarcQuarantineAction
177+
Parameter Sets: (All)
178+
Aliases:
179+
Applicable: Exchange Online
180+
181+
Required: False
182+
Position: Named
183+
Default value: None
184+
Accept pipeline input: False
185+
Accept wildcard characters: False
186+
```
187+
188+
### -DmarcRejectAction
189+
This setting is part of spoof protection.
190+
191+
The DmarcRejectAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
192+
193+
- Quarantine: This is the default value. Move the message to quarantine.
194+
- Reject: Reject the message.
195+
196+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
197+
198+
```yaml
199+
Type: SpoofDmarcRejectAction
200+
Parameter Sets: (All)
201+
Aliases:
202+
Applicable: Exchange Online
203+
204+
Required: False
205+
Position: Named
206+
Default value: None
207+
Accept pipeline input: False
208+
Accept wildcard characters: False
209+
```
210+
162211
### -Enabled
163212
This parameter is reserved for internal Microsoft use.
164213

@@ -487,6 +536,27 @@ Accept pipeline input: False
487536
Accept wildcard characters: False
488537
```
489538

539+
### -HonorDmarcPolicy
540+
This setting is part of spoof protection.
541+
542+
The HonorDmarcPolicy parameter specifies whether to use the `p=` policy action in the DMARC DNS (TXT) record for the domain when spoofing is detected. Valid values are:
543+
544+
- $true: If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=quarantine`, use the action that's specified by the DmarcQuarantineAction parameter. If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=reject`, use the action that's specified by the DmarcRejectAction parameter.
545+
- $false: This is the default value. If spoofing is detected, use the action that's specified by the AuthenticationFailAction parameter.
546+
547+
```yaml
548+
Type: Boolean
549+
Parameter Sets: (All)
550+
Aliases:
551+
Applicable: Exchange Online
552+
553+
Required: False
554+
Position: Named
555+
Default value: None
556+
Accept pipeline input: False
557+
Accept wildcard characters: False
558+
```
559+
490560
### -ImpersonationProtectionState
491561
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
492562

exchange/exchange-ps/exchange/Set-AntiPhishPolicy.md

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
2525
[-AdminDisplayName <String>]
2626
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2727
[-Confirm]
28+
[-DmarcQuarantineAction <SpoofDmarcQuarantineAction>]
29+
[-DmarcRejectAction <SpoofDmarcRejectAction>]
2830
[-Enabled <Boolean>]
2931
[-EnableFirstContactSafetyTips <Boolean>]
3032
[-EnableMailboxIntelligence <Boolean>]
@@ -40,6 +42,7 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
4042
[-EnableViaTag <Boolean>]
4143
[-ExcludedDomains <MultiValuedProperty>]
4244
[-ExcludedSenders <MultiValuedProperty>]
45+
[-HonorDmarcPolicy <Boolean>]
4346
[-ImpersonationProtectionState <ImpersonationProtectionState>]
4447
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
4548
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
@@ -162,6 +165,52 @@ Accept pipeline input: False
162165
Accept wildcard characters: False
163166
```
164167

168+
### -DmarcQuarantineAction
169+
This setting is part of spoof protection.
170+
171+
The DmarcQuarantineAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
172+
173+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder.
174+
- Quarantine: This is the default value. Move the message to quarantine.
175+
176+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
177+
178+
```yaml
179+
Type: SpoofDmarcQuarantineAction
180+
Parameter Sets: (All)
181+
Aliases:
182+
Applicable: Exchange Online
183+
184+
Required: False
185+
Position: Named
186+
Default value: None
187+
Accept pipeline input: False
188+
Accept wildcard characters: False
189+
```
190+
191+
### -DmarcRejectAction
192+
This setting is part of spoof protection.
193+
194+
The DmarcRejectAction parameter specifies the action to take when the message is detected as spoofing and the policy action value in the DMARC TXT record for the domain is `p=quarantine`. Valid values are:
195+
196+
- Quarantine: This is the default value. Move the message to quarantine.
197+
- Reject: Reject the message.
198+
199+
This parameter is meaningful only when the HonorDmarcPolicy parameter is set to the value $true.
200+
201+
```yaml
202+
Type: SpoofDmarcRejectAction
203+
Parameter Sets: (All)
204+
Aliases:
205+
Applicable: Exchange Online
206+
207+
Required: False
208+
Position: Named
209+
Default value: None
210+
Accept pipeline input: False
211+
Accept wildcard characters: False
212+
```
213+
165214
### -Enabled
166215
This parameter is reserved for internal Microsoft use.
167216

@@ -490,6 +539,27 @@ Accept pipeline input: False
490539
Accept wildcard characters: False
491540
```
492541

542+
### -HonorDmarcPolicy
543+
This setting is part of spoof protection.
544+
545+
The HonorDmarcPolicy parameter specifies whether to use the `p=` policy action in the DMARC DNS (TXT) record for the domain when spoofing is detected. Valid values are:
546+
547+
- $true: If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=quarantine`, use the action that's specified by the DmarcQuarantineAction parameter. If spoofing is detected and the action specified in the DMARC TXT record for the domain is `p=reject`, use the action that's specified by the DmarcRejectAction parameter.
548+
- $false: This is the default value. If spoofing is detected, use the action that's specified by the AuthenticationFailAction parameter.
549+
550+
```yaml
551+
Type: Boolean
552+
Parameter Sets: (All)
553+
Aliases:
554+
Applicable: Exchange Online
555+
556+
Required: False
557+
Position: Named
558+
Default value: None
559+
Accept pipeline input: False
560+
Accept wildcard characters: False
561+
```
562+
493563
### -ImpersonationProtectionState
494564
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
495565

0 commit comments

Comments
 (0)