Domain-based Message Authentification Reporting & Conformance (DMARC)
What it’s mean ?
DMARC – is an improved standard to protect your brand name – stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols.
If you want to protect your domain with DMARC or use DMARC to filter spam and you use Office 365 Exchange online protection, note that Microsoft decided to alter normal DMARC policy. Imagine a domain protects itself and a forged message was identified as DMARC=fail and policy is set to reject with 100%. DMARC policy example: v=DMARC1;p=reject;pct=100
In this case Office 365 will ignore reject and will deliver email marked as spam. A header will contain “dmarc=fail action=oreject” (oreject being overwritten reject.)
Here is how Microsoft justifies this design decision
“If the DMARC policy of the sending server is p=reject, EOP marks the message as spam instead of rejecting it. In other words, for inbound email, Office 365 treats p=reject and p=quarantine the same way.
Office 365 is configured like this because some legitimate email may fail DMARC. For example, a message might fail DMARC if it is sent to a mailing list that then relays the message to all list participants. If Office 365 rejected these messages, people could lose legitimate email and have no way to retrieve it. Instead, these messages will still fail DMARC but they will be marked as spam and not rejected. If desired, users can still get these messages in their inbox through these methods:
- Users add safe senders individually by using their email client
- Administrators create an Exchange mail flow rule (also known as a transport rule) for all users that allows messages for those particular senders.”
Let us go farther together!
Whether for a simple question or suggestion, we are at your disposal to answer it by email or by phone.