Blog Post

Exchange Team Blog
3 MIN READ

Announcing New DMARC Policy Handling Defaults for Enhanced Email Security

The_Exchange_Team's avatar
The_Exchange_Team
Platinum Contributor
Jul 19, 2023

Domain-based Message Authentication, Reporting & Conformance (DMARC) is a standard that helps prevent spoofing by verifying the sender’s identity. If an email fails DMARC validation, it often means that the sender is not who they claim to be, and the email could be fraudulent.

The ‘p=’ value (this stands for “policy”) in a DMARC TXT DNS record represents the sender’s policy for their domain. It tells the receiver what to do if an email fails DMARC validation. There are three possible values for the policy: none, quarantine, and reject. This helps the sender protect their reputation and brand from being spoofed and helps the recipient avoid emails from unverified senders.

Today, we are announcing important changes to our DMARC policy handling that affect both consumer and enterprise customers.

For our consumer service (live.com / outlook.com / hotmail.com), we have changed our DMARC policy handling to honor the sender’s DMARC policy. If an email fails DMARC validation and the sender’s policy is set to p=reject or p=quarantine, we will reject the email.

For our enterprise customers, you can now choose how to handle emails that fail DMARC validation and choose different actions based on the policy set by the domain owner, such as p=reject or p=quarantine. If the recipient domain's MX record points to Office 365, by default, we will honor the sender’s DMARC policy and reject (p=reject) or quarantine (p=quarantine) the email as instructed. However, you can change this behavior and specify different actions for different policies in the Anti-Phishing policy section of the Microsoft 365 Defender portal. Note that if the tenant recipient domain's MX record points to a different email security solution that sits in front of Office 365, then 'Honor DMARC' will not be applied because the information about the sending infrastructure is likely affected by the complex mail flow routing.  However, if enhanced filtering for connectors is enabled, we do apply “Honor DMARC” even when MX is pointed to 3rd party, and it will be treated as normal incoming message.

We’ve already begun rolling out the new policies, starting July 19, 2023, we’re will continue to rollout them out to our government and 21Vianet clouds. As stated in Message Center posts MC640228 (worldwide and government clouds) and MC640225 (21Vianet), you have until mid-August to modify the policies before they’re enforced.

For messages that fail DMARC validation where the policy is reject and this action is taken on the message, the sender will receive a non-delivery report (NDR) with the following message (using contoso.com as an example):

550 5.7.509: Access denied, sending domain contoso.com does not pass DMARC verification and has a DMARC policy of reject

We encourage you to review your DMARC settings and customize if needed to benefit from improved email security and deliverability.

Learn more:

Microsoft Defender for Office 365 team

Updated Jul 26, 2023
Version 3.0

62 Comments

  • Rafal_Fitt  - No, to get the most compliant behavior (Explicit email authentication failures for p=quarantine DMARC policies are quarantined, and failures for p=reject DMARC policies are rejected), you need the top left setting in the table which is Spoof intelligence On and Honor DMARC policy On.

  • The mentioned article on Anti-Phishing policy does not cite any recommendation on configuring the policy for hybrid environments utilizing centralized mail flow.

    The blog post itself mentions a "different email security solution." Which is not the same as having an on-premises Exchange organization. 

     

    Is disabling the "Honor DMARC record policy when the message is detected as spoof" setting sufficient? 

    Are there any dependencies to the inbound connector types, e.g., OnPremises handles DMARC differently automatically?

  • Rafal_Fitt's avatar
    Rafal_Fitt
    Iron Contributor

    Arindam_Thokder 

     

    please correct me if I am wrong:

     

    the table located at https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-phishing-policies-about?view=o365-worldwide#spoof-protection-and-sender-dmarc-policies shows that to get the most compliant behavior (Explicit email authentication failures for p=quarantine DMARC policies are quarantined, and failures for p=reject DMARC policies are rejected), you need to turn "honor DMARC policy" OFF ?

  • rpodric's avatar
    rpodric
    Bronze Contributor

    Nothing mentioning DMARC and looking like this:

    https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-phishing-policies-about?view=o365-worldwide#spoof-protection-and-sender-dmarc-policies

     

    has shown up in our Anti-phishing policy, so I guess it's still rolling out.

  • By the way, if we are paraphrasing the RFC, one could argue that treating p=reject as p=quarantine is a non-RFC compliancy (6.3) 🙂

  • @Arindam True, same applies to DKIM SPF, etc. Nobody can force receiver to do anything. Yet, NTA7516 (secure email) compliance here dictates receiving parties should implement these techniques for non-repudiation, so it's a thing here for gov, healthcare & edu a.o.

  • mderooij - The rfc7489, section 6.7 says "Mail Receivers MAY choose to accept email that fails the DMARC mechanism check even if the Domain Owner has published a "reject" policy". So, what we did till now is not a non-RFC compliant behavior. Also, by default the p=reject used to be quarantined for Enterprise and not sent to Junk. 

  • martin That is correct. Up to now, inbound messages failing DMARC checks did not get rejected nor quarantined (went to junk). Only guess for this non-RFC compliant behavior is someone tried to avoid liability issues. Still, lots of customers I know implemented transport rules to override this behavior. These rules will become obsolete.

  • Martin_Wildi's avatar
    Martin_Wildi
    Brass Contributor

    So if i get it right, microsoft didn't respect my DMARC settings until now? so they accepted Mails, even if DMARC validation failed and policy was set to reject or quarantine?

    just to be sure about what changes...